Ian Yip - News, Features, and Slideshows

Ian Yip in pictures

  • CSO Breakfast The Identity-Powered Enterprise Access Management for a World without Perimeters

    An identity-centric approach to Access Management allows IT to provide employees with seamless access to systems and information, when and where they require it while securing the mobile, cloud- connected enterprise against insider threats and external attacks. At the business level, this approach allows the organisation to improve customer acquisition and engagement by accelerating the delivery of secure new business services. In other words, organisations that evolve into an Identity- Powered Enterprise will be better positioned to both enable and protect their business.

    30 May | View galleries

News about Ian Yip
  • CSO Breakfast The Identity-Powered Enterprise Access Management for a World without Perimeters

    An identity-centric approach to Access Management allows IT to provide employees with seamless access to systems and information, when and where they require it while securing the mobile, cloud- connected enterprise against insider threats and external attacks. At the business level, this approach allows the organisation to improve customer acquisition and engagement by accelerating the delivery of secure new business services. In other words, organisations that evolve into an Identity- Powered Enterprise will be better positioned to both enable and protect their business.

    Ian Sharp | 30 May | Read more

  • CSO Roundtable : Effective Mobile Security

    Although BYOD security gets the headlines, IT managers find issues like device management, scope management and support just as challenging. At the recent CSO Australia Mobile Security roundtable, held at AusCERT, 21 guests thrashed out their experiences and concerns.

    Richard Chirgwin | 07 Jun | Read more

  • The new IAM: nailing shut the door on the Trojan horse

    Cloud, mobility and bring-your-own-device (BYOD) computing are providing so many new potential ingress points to your network that it’s getting near impossible to keep up. The solution, as David Braue finds, lies in reconsidering your exposure, revisiting your IAM strategy – and picking your battles carefully.

    David Braue | 15 May | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place