09.11.2017 - Buyer’s Guide to Multi-Factor Authentication (MFA)

MFA is the norm in business today due to the desire for better access control and the need to comply with regulatory requirements. And while every company and every vertical have different requirements for their MFA solutions, they all should start by analyzing the same three elements: scope, usability, and means of delivery. With these elements in mind, this paper takes a tactical approach to guide you through various MFA options. ...

09.4.2017 - Cybersecurity Threats Your Employees Should Know About

Cybersecurity is a bigger concern than ever before, both for corporations and individuals. Hackers have a wide variety of tools at their disposal to help them access private data that belongs to your company or clients. It’s important to be aware of the major areas of susceptibility in order to safeguard the vital information that exists in your company’s network and it’s important to make sure your employees are aware as well. Here are breach points you and your employees should watch out for: ...

08.11.2017 - Why Identity and Access Management Is So Important for Data Security

With advances in modern technology, stealing passwords and hacking into networks is easier than ever. A hacker can crack a four letter, two-digit password in less than a second. More importantly, if your data is not on a completely private server, a breach anywhere on the server could compromise everyone’s data. ...

07.10.2017 - Cloud Provisioning – The Good, Bad, and the Ugly

When we talk about provisioning cloud services, there is Just In Time (JIT) provisioning and bulk provisioning. JIT provisioning is where accounts are created as a side effect from federation. In other words, the first time a user federates to a service, his account is created using the federation token and information queried from the user. Bulk provisioning is where the accounts are created in bulk ahead of time and actively maintained independently from federation. The main problems with JIT provisioning are ...

05.31.2017 - Using IAM Tools To Cut The Costs of a Data Breach

What is the cost of a data breach? In the case of Yahoo! CEO Marissa Meyer, who accepted the consequences of the 2013/2014 Yahoo data breach in 2016, the answer was at least $2 million, the amount of the annual bonus she lost because of the breach. She also gave up her annual equity grant for 2017, which could have been worth millions more. However, it probably cost Yahoo!, its partners and its users a lot more than that. What happened and what could have been done to prevent these types of breaches? ...

04.28.2017 - Authentication-as-a-Service for Everyone

Authentication-as-a-Service (AaaS) is becoming an attractive option for businesses tired of deploying costly and complex in-house authentication solutions and for those without the internal resources to deploy. AaaS offers enhanced security and scalability at a fraction of the cost than in-house solutions, so why wouldn’t it be considered? ...

03.29.2017 - A Password-Free World: Past, Present or Possible Future?

Struggling to remember the password for an email address or the answer to that odd security question to sign into a bank account online can often make us feel nostalgic for the days before our lives were filled with PC passwords and unique swipe patterns on smartphones. ...

Page 1 of 512345