Profile cover photo
Profile photo
Courion Corporation
68 followers
68 followers
About
Communities and Collections
Posts

Post has attachment
In the latest on the Courion blog, Solutions Consultant of Emerging Technologies Jason Mutschler advises you re-set your passwords early and often as a general rule, but particularly in light of the recently disclosed heartbleed bug.
Add a comment...

Post has attachment
Add a comment...

Post has attachment

Post has attachment
In this video, Harvard Pilgrim Health Care discusses their use of Courion's Access Insight™. Because of HIPAA regulations, they need to know exactly who is accessing their protected health information. They always felt they had a good handle on access data, but Access Insight showed them things they hadn't seen before.
Add a comment...

Post has attachment
Today is the last day to take advantage of the CONVERGE early bird registration discount! Reserve your spot now to save $150!
Add a comment...

Post has attachment
No mistaken identity: Brian Iverson, research director at +Gartner, Inc.  discusses how identity and access management (IAM) enables the right individuals to access the right resources at the right times for the right reasons.
Add a comment...

Post has attachment
Additional CONVERGE 2014 keynote just announced! Kyle F. Waldinger, Assistant United States Attorney, United States Department of Justice. Mr. Waldinger will discuss recent cases prosecuted by the Computer Hacking and Intellectual Property (CHIP) Unit of the U.S. Attorney’s Office for the Northern District of California. He will also share recommendations for steps that CIOs and CISOs can take now that might make any incidence of data breach by company insiders or external cyber attackers more likely to be successfully tried as a criminal case.
Add a comment...

Post has attachment
In the latest on the Courion blog, Jim Speredelozzi, Senior Manager of Inside Sales, reviews some top retail breach disclosures involving payment card data from the past 10 years. He also offers common sense tips for preventing a breach, including: realigning IT budget to deal with insider threats, employee education, use of best practices for password protection and use of an IAM solution with built-in identity and access intelligence to improve monitoring capabilities.
Add a comment...

Post has attachment
We're pleased to announce a formal agreement with Ping Identity that enables Courion to resell +Ping Identity products. The agreement allows Courion to provide a jointly-integrated, holistic solution for managing user identities and access to resources in the cloud and across the traditional on-premises enterprise. For more information on this exciting announcement, please view the press release below. Also, learn more at CONVERGE 2014, our annual user conference, where Ping Identity will be presenting a joint session with Courion and giving interactive demos in the solutions showcase!
Add a comment...

Post has attachment
In the latest on our blog, Nick Berents notes Rugby fans may know about the rugby scrum, dirty tricks and illegal moves committed in the scrum out of sight of the referee to gain an advantage. Fans may not know when it happens, and many players don’t recognize it. But they see and feel the results as their offense gets disrupted and the team is at a disadvantage. Kind of like data breaches. You don’t know where it's coming from or when it happens, but when the damage is done, it's too late. What are your defenses against the dark arts of data breaches? Don’t let your scrum collapse. Understand how to answer the critical questions “Who has access to what resources?” and “Are they using that access appropriately?"
Add a comment...
Wait while more posts are being loaded