Category: Workforce Identity & Access Management (IAM)

Flexible Identity: IAM solutions need to bend… a little at least!

In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…

4 years ago

Authentication, Authorization, Auditing: the Three Pillars of IAM

In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…

4 years ago

Passwordless Authentication 101: What it is, How you can adopt it, and Why it’s the future

To stick with passwords or to go passwordless is a million-dollar cyber security question. Resetting, remembering, and changing passwords regularly…

4 years ago

How to select your IAM service provider

Given the increasing number of cyber-attacks, greater adoption of Cloud Services, and swelling mobile workforce, it’s little wonder that IAM…

4 years ago

Increased security often means reduced efficiency. Here are 4 ways an IAM can boost productivity while staying secure.

Identity Access Management (IAM) is a collective term that covers processes and policies to manage user identities and regulate user…

4 years ago

The twin benefits of IAM: Streamlining compliance processes and security

Process reliability, transparency, traceability, and flexibility - the four aspects of modern IT security. An Identity and Access Management solution…

4 years ago

A malicious user gaining access to your apps can be catastrophic. Here’s how a secure SSO could help.

In any enterprise, it is a given that employees will come and go, and many will switch roles within the…

4 years ago

Single Sign-On and why your organization needs it!

Single Sign-On (SSO) is a session and user authentication service where one set of credentials - typically a username and…

4 years ago

Business from anywhere: IAM as a vital piece of the Business Continuity puzzle

COVID-19 was a shock to the global economy. The pandemic aside, the enforced and voluntary closure of offices has dramatically…

5 years ago

Burn down the Firewall! The Future is Device-level Security

Many enterprises have built their cybersecurity around their firewalls. But increasingly, the firewall is losing favor in modern enterprises with…

5 years ago