
SecZetta and SailPoint Partner to Streamline Third-party Identity Risk, Lifecycle & Access
The Importance of Third Party Identity Risk from third-party suppliers is set to rise as many businesses adopt new technologies to increase efficiency without having the capabilities to assess and man…

The Real Advantages of 3rd Party Identity; Cost Savings
To ensure the highest levels of efficiency and reduced risk, companies need to consider IAM programs purpose built to address third party challenges.

SecZetta joins the SailPoint Identity+ Alliance
Partnership Enhances Identity Governance with Third Party Identity Risk and Lifecycle Management Capabilities Newport, RI – SecZetta, the leading provider of third party identity risk and lifecycle …

Third Party Risk, Please Meet Third Party Identity
Third Party Risk is all the hype right now, but… Third Party Risk and Third Party Identity are being managed separately (if at all).

The weak link in your enterprise security lies with third-parties: Including partners and suppliers
Vendor Risk According to a survey conducted this past fall by the Ponemon Institute, “56 percent of organizations have had a breach that was caused by one of their vendors.

Identity Validation – The Key to Removing Third Party Access in a Timely Fashion.
Nobody told us! We hear it all the time. We have third parties who are are no longer performing contractual duties, yet no one tells us that their access should be terminated.

Data Breaches Aren’t Going Away – Stop Tip Toeing Around Third Party Identity Risk
Tip Toeing Around the Problem It feels like data breaches are occurring with more frequency and with greater impact on both brands and individuals.

The Challenges of the Chief Information Security Officer (CISO)
Top CISO Challenges Recently I took it upon myself to break down the top CISO challenges of 2017. I took to our customers, prospects, and even scoured the internet.

Third Party Risk at the Identity Level
Trusting your vendors is only getting you so far Many companies are placing trust in third parties without a proven means of managing, controlling, and monitoring the access being granted.

Financial Institutions to Focus on Greater Cybersecurity
In the wake of perhaps the greatest data breach recorded, it seems the financial services industry needs to up its game and fast.