04.28.2017 - Authentication-as-a-Service for Everyone

Authentication-as-a-Service (AaaS) is becoming an attractive option for businesses tired of deploying costly and complex in-house authentication solutions and for those without the internal resources to deploy. AaaS offers enhanced security and scalability at a fraction of the cost than in-house solutions, so why wouldn’t it be considered? ...

03.29.2017 - A Password-Free World: Past, Present or Possible Future?

Struggling to remember the password for an email address or the answer to that odd security question to sign into a bank account online can often make us feel nostalgic for the days before our lives were filled with PC passwords and unique swipe patterns on smartphones. ...

03.16.2017 - Five Things CMOs Need to Know About Customer Identity and Access Management

There was a time when a CMO’s didn’t need to worry about Customer Identity & Access Management (CIAM) solutions. CIAM was the province of the IT department. Things change rapidly, though, and now marketing and identity access management go hand-in-hand. A business’s applications need to be able to identify customers across multiple platforms, and should tailor its marketing strategies to specific customer identities that can only be uncovered effectively through CIAM. ...

02.28.2017 - Three Reasons to Consider Cloud SSO for Apps

Cloud identity and access management professionals are turning to single sign-on (SSO) options to help manage the expansion of services and apps their organizations use. By pushing SSO to the cloud, they’re discovering increased support for each new tool without all the help desk cost increases that used to come along for the ride. ...

01.10.2017 - Navigating a Multi-Forest Office 365 Migration Without Losing Your Mind

A logistics management business wants to consolidate its multi-tenant, multi-forest Office 365 environment. Expansion via acquisitions created a multi-tenant, multi-forest problem for the logistics company further complicated by additional challenges involving business productivity, managing users in AD and development of cross-forest trust. They also wanted SSO to reinforce secure access to applications and decrease time used by IT to manage end-user requests for password reset within their business. ...

12.1.2016 - Why Your Business Needs an Identity Hub

With businesses working across multiple platforms with multiple users, identity authentication becomes more and more complex. Thousands, millions and eventually billions of access points will start pointing at the same databases and enterprise systems. The only way to manage that scale appears to be an identity hub. ...

11.17.2016 - Best Practices for Better UX and Security

As technology evolves, we begin to access our data across more devices and through different platforms, and convenience and ease of use are key. While these new technologies pose their own challenges for data security, they also bring about a new set of usability concerns. ...

Page 1 of 41234