Technology News & Blog

Graphic

What is Identity and Access Management Technology?

August 19, 2022

There is a serious vulnerability that is caused by excessive user privilege. Identity and Access Management systems provide a valuable way to mitigate the threat and keep you secure. Identity and Access Management (IAM) systems are a way to electronically identify users and manage their access permissions automatically. IAM systems can be used to onboard,…

Internet of Things

3 Big Challenges with the Internet of Things (IoT)

July 28, 2022

IoT devices are continually popular within both the workplace and the home. Developments in technology behind things like speakers, TV’s, doorbells, appliances and even cars are moving to a much more automated and connected world. While these advancements are making strides for accessibility and convenience of consumers, it is important to also consider the security…

Spam Email Fraud: What It Is and How to Prevent It

July 18, 2022

Did you know that spam emails make up almost 70% of total email traffic? Scams and fraud make up 2.5% of all spam emails. That’s millions and millions of email-based fraud attempts being sent to people all around the world on a weekly basis. Email service providers try to protect users from this problem with…

How To Achieve Zero Trust Maturity

June 8, 2022

Zero Trust has been a buzzword in the Identity and Access world for quite some time, but it is still very much at the forefront of cyber security professionals’ minds. So, what exactly is Zero Trust and why is there such a strong push for identity professionals to make the move toward this approach? Contrary…

Beyond Trust – A Concensus Cybersecurity Partner

May 27, 2022

Concensus is happy to announce that we have added to our Identity and Access Management portfolio with Beyond Trust. Beyond Trust provides privileged password management, secure remote access (Bomgar), and cloud privilege protection. We have scheduled an introductory webinar for June 28th at 2:00 pm EST. Join us as we discuss the new partnership between Concensus and…

Data protection, privacy, and internet security concept. Cybersecurity for business and internet project. Vector illustration of a data security services.

What the SailPoint purchase by Thoma Bravo means to you

May 24, 2022

Private Equity firm Thoma Bravo acquires IaM software giant SailPoint for about $6.9 Billion – announced Monday 4/1. Thoma Bravo’s deal to take the Austin, TX-based Identity and Access Management provider SailPoint private shows the growing demand for enterprise security software. Thoma Bravo has made serious moves in the cybersecurity world, showing the growing need…

ENGL Releases Imaging Toolkit 12

May 11, 2022

ENGL announced on Friday April 8th, 2022 that Imaging Toolkit 12 is available for download.  There are some very important changes in this release including the unique ENGL Image Service and the cloud-based ENGL Monitor Service. Keep reading for more information on these exciting features! ENGL Image Service offers Imaging Toolkit 12 customers to use Build…

How to avoid an identity management crisis during the M&A process

April 27, 2022

Mergers and Acquisitions are occurring at a record rate. They are a great way to create new opportunities, allowing enterprises to reach new markets, enable growth and lead to success for all involved. But according to most studies, acquisitions fail 70-80% of the time. Most explanations for these failures are because of problems with integration…

State-sponsored cyber attacks expected to rise

March 10, 2022

Given today’s geo-political escalations within eastern Europe, there is expected increase in state-sponsored cyberattacks against NATO Nations.  Nations are finding that it is easier and cheaper to disrupt rival states by utilizing vulnerabilities in devices connected to critical infrastructure.  The international cyber group, Anonymous, is already targeting Russian agencies and businesses.  They have claimed over…

Let us give you peace of mind

Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.