The Resource Hub for IT Infrastructure, Cybersecurity, and End User Computing
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com
  • Business of IT
    • Microsoft Newsroom
    • IT Lifecycle Management
    • ITAM and SAM
    • Procurement
    • Software Licensing
    • Training and Adoption
  • Cybersecurity
    • Data and Applications
    • Hybrid Cloud
    • Identity and Access Management
    • Program Strategy
    • Security Operations
  • Digital Workplace
    • End-User Computing
    • Mobility
    • Modern Desktop
    • Unified Communications and Collaboration
  • Next-Generation Infrastructure
    • Artificial Intelligence
    • Cloud
    • Infrastructure
    • Networking
    • Storage
  • Case Studies
  • Press Releases
  • SHI.com

Archives

Tag Archives for: "secure identity"
Home » secure identity
Unified AI infrastructure: 5 key takeaways for IT leaders
By Mayur Pitamber, Emily Danta
In Artificial Intelligence, Business of IT, Cybersecurity, Data and Applications, ITAM and SAM, Next-Generation Infrastructure, Program Strategy, Security Operations
Posted November 7, 2025

Unified AI infrastructure: 5 key takeaways for IT leaders

Reading Time: 5

READ MORE
Want to keep your K-12 district cyber safe? Prioritize IAM
By Melissa McEntee
In Cybersecurity, Identity and Access Management
Posted November 3, 2025

Want to keep your K-12 district cyber safe? Prioritize IAM

Reading Time: 7

READ MORE
3 strategic AI frameworks to move from experiment to execution
By Lauren Baines
In Artificial Intelligence, Cloud, Data and Applications, End-User Computing, Infrastructure, IT Lifecycle Management, ITAM and SAM, Next-Generation Infrastructure, Software Licensing
Posted October 21, 2025

3 strategic AI frameworks to move from experiment to execution

Reading Time: 9

READ MORE
Innovation Heroes: The deepfake that swindled a company out of $25 million
By SHI Staff
In Artificial Intelligence, Cybersecurity, Data and Applications, Identity and Access Management, Innovation Heroes, Podcasts
Posted October 16, 2025

Innovation Heroes: The deepfake that swindled a company out of $25 million

Reading Time: 5

READ MORE
IAM strategy hit a wall? Strengthen your security, across six core identity domains
By SHI Staff
In Cybersecurity, Identity and Access Management, Program Strategy
Posted October 6, 2025

IAM strategy hit a wall? Strengthen your security, across six core identity domains

Reading Time: 2

READ MORE
SHI’s Research Roundup for October 3, 2025
By Scott Smith
In Cybersecurity, Identity and Access Management, Newsletter, Research Roundup, Security Operations, Strategic Insights
Posted October 3, 2025

SHI’s Research Roundup for October 3, 2025

Reading Time: 3

READ MORE
How to build an effective IAM program in 2025’s hybrid landscape
By Brian Carufe
In Cybersecurity, Hybrid Cloud, Identity and Access Management, Program Strategy
Posted December 16, 2024

How to build an effective IAM program in 2025’s hybrid landscape

Reading Time: 4

READ MORE
How Microsoft MVP Steve Weiner solves your toughest Microsoft challenges
By Zack Donnenberg, Blair Loveland
In Business of IT, Digital Workplace, End-User Computing, IT Lifecycle Management, ITAM and SAM, Modern Desktop, Software Licensing
Posted October 11, 2024

How Microsoft MVP Steve Weiner solves your toughest Microsoft challenges

Reading Time: 6

READ MORE
Microsoft Entra: Secure identities against today’s threats
By SHI Staff
In Business of IT, Identity and Access Management, Software Licensing
Posted July 1, 2024

Microsoft Entra: Secure identities against today’s threats

Reading Time: < 1

READ MORE
How to create a comprehensive identity and access management (IAM) framework
By SHI Staff
In Cybersecurity, Identity and Access Management
Posted March 29, 2024

How to create a comprehensive identity and access management (IAM) framework

Reading Time: < 1

READ MORE
Load More

shi.com

Business of IT

ITAM & SAM
Software Licensing
IT Lifecycle Management
Procurement
Training

Digital Workspace

Unified Communications & Collaboration
End User Computing
Mobility
Modern Desktop

Cybersecurity

Identity and Access Management
Data & Applications
Hybrid Cloud
Program Strategy
Security Operations

Next Generation Infrastructure

Infrastructure
Cloud
Networking
Storage

Terms and Conditions
Privacy
Do Not Sell My Personal Information
California Transparency in Supply Chains Act
Transparency in Coverage Regulations (MRFs)

ISO 9001

© 2025 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers.