02.11.2021 - Identity as the New Perimeter of Security
There was a time when all of a company’s data was completely on the premises. Even an employee who needed to work remotely would use a VPN to get into the company’s on-premise physical network. This was an environment with many fewer challenges to authentication security. Everyone who was in a position to access a company’s data was someone who was supposed to be there, so as long as the building’s physical security was strong, cybersecurity would be strong as well. ...
01.8.2021 - Types of Data Breaches
If you’re responsible for managing your company’s cybersecurity, you know that one of the biggest threats you need to address is the possibility of a data breach. A data breach can spell disaster for any company, and no company is entirely safe. Some of the biggest companies in the world have been the victims of data breaches, and it has cost them millions — sometimes even billions. Even a small, brief data breach can be catastrophic for your bottom line and your reputation. So what types of data breaches should you be on the lookout for? ...
12.7.2020 - IAM Managed Services Address a Human Problem
The task of protecting your company’s data from a breach comes with one very important challenge. Users. If cybersecurity were merely an internal process, it would be easy. But data is useless unless the people who need it are able to access it, and that makes identity access management a human problem. ...
10.8.2020 - The Forrester Wave: Customer Identity and Access Management, Q4 2020
The report helps security and risk (S&R) professionals select the right vendor for their needs. The 13 most significant CIAM vendors are evaluated who include “…a thought-leading, productized portfolio of products and services. According to the report, “[Forrester] included CIAM vendors that demonstrated thought leadership and solution strategy execution by regularly updating and improving their productized product and model portfolio. Customers of vendors had to report that the solution is purpose-built for customer-facing identity and access management. ...
10.1.2020 - 6 A/B Tests You Can Run on Your E-Commerce Cart
09.9.2020 - The Best Secure Authentication Methods for Teams Working from Home
Devin Partida, Editor-in-Chief of ReHack.com, tapped Optimal IdM for her recent blog, “The Best Secure Authentication Methods for Teams Working from Home”. ...
08.28.2020 - 6 Security Features to Look for in Your CRM Software
07.1.2020 - Circle of Trust, An Identity Federation Journey
Identity federation broadens SSO processes to include third-party or partner business networks, bringing outside enterprises into the circle of trust.
06.21.2020 - Walking the Path to IAM Maturity
06.19.2020 - Types of Authentication Methods
Authentication is the process of allowing people, often employees, to identify who they are so that they can gain access to the company’s facilities or computer network. The process is extremely important to help prevent unauthorized access, which can lead to catastrophic data breaches. There’s a wide variety of authentication methods available, ranging from a simple single password to complex multi-factor authentication, including passwords, one-time codes and biometrics. ...