SecZetta

SailPoint acquires SecZetta to help companies validate non-employee identities
With nearly half of today’s enterprises comprised of non-employees, organizations need to factor this growing group of identities into their approach to identity security. …

SecZetta and Active Cyber help clients optimize their third-party identity governance processes
SecZetta announced a new partnership with Active Cyber, a cloud consultancy, specializing in the implementation of Cloud-based Identity & Access Management (IAM) …

Manage and monitor third-party identities to protect your organization
SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from …

SecZetta partners with One Identity to automate identity access for third-party users
SecZetta announced a new integration in partnership with One Identity. The integration of the SecZetta Third-Party Identity Risk solution with the One Identity Active Roles …

Reliance on third party workers making companies more vulnerable to cyberattacks
A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …

Third-party identity risk management, compliance, or both?
Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or …

How do I select a PAM solution for my business?
In order for organizations to prevent becoming the next victim of a breach due to unauthorized third-party user access, as has happened in prominent recent breaches, a strong …

Minimizing cyberattacks by managing the lifecycle of non-human workers
The number of non-human workers is growing, particularly as global organizations increasingly prioritize cloud computing, DevOps, IoT devices, and other digital transformation …
SecZetta and Focal Point provide clients with a 360° view of third-party identity and lifecycle management
SecZetta, the leading provider of third-party identity management solutions, and Focal Point, a leading cybersecurity services provider, announced a new solution integrator …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility