Category: Identity and Access Management

Can IAM Improve User Experience and Efficiency on the Cloud?

When an enterprise migrates to the cloud, it essentially opens the doors to a range of new possibilities for its…

5 years ago

Access Management Across Different Devices and Browsers

In today’s technology ecosystem, a strong foundation for authorization plays an important role in the overall data security of a…

5 years ago

Exploring the Difference Between Identity Management and Access Management

Only a small percentage of people across industries understand the difference between Identity Management and Access Management. The two concepts…

5 years ago

Managing Identity and Access in the Workplace

Identity and access management, sometimes simply known as identity management, refers to the IT function of maintaining security through the…

5 years ago

Customer IAM for GDPR Compliance

In order to protect the digital privacy of European citizens, the European Union created the General Data Protection Regulation to…

6 years ago

Can an IAM solution prevent Credential Phishing?

The most common misconception regarding credential phishing is that it is people-driven and not organization-driven. Therefore, organizations tend to underestimate…

6 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago

Overcoming the Challenges of the Media Industry With Identity

When the digital revolution started, media companies were among the first ones to embrace it. Today, most media companies create…

6 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

6 years ago

What is ADFS and why do you need it?

ADFS (Active Directory Federation Services) is an SSO solution created by Microsoft to authenticate users logging into applications which are…

6 years ago