Category: Identity and Access Management

The Importance of Single Sign-on for Educational Institutions

Let’s admit it: schools and universities today are not what they used to be back when we were growing up.…

6 years ago

Protect your Business from Privilege Abuse with IAM

Privilege abuse - that is the security threat that your business’s IT team is most worried about. According to a…

6 years ago

The IAM Imperative: Through An SMB’s Eyes

Today’s MNCs were once small or medium businesses (SMBs). Small and medium businesses are the proving ground for emerging technology,…

6 years ago

Password Managers can be Hacked. Now What?

On average, every person has 7.6 accounts - that’s a lot of user IDs and passwords for an individual! Remembering…

6 years ago

Can you Trust the Agent on your Active Directory?

If a company works with very few applications, user repositories would have to be mapped individually for each application. Every…

6 years ago

IAM using SSO and Federated Identity Management

Identity management encompasses several operational mechanisms for managing users across a large system or network of applications. Two of the…

6 years ago

Cloud Security 101: Identity and Access Management

An Identity and Access Management (IAM) solution allows organizations to manage user access to critical data. It is an intermediate…

6 years ago

Meet GCP IAM: The Identity and Access Management Solution from Google

Google Cloud Platform (GCP) IAM comes as a free service that is available by default to all users of the…

6 years ago

Secure and Efficient Certificate-Based Authentication

Security and privacy of user data are crucial for any organization and is also a major area of risk. So…

6 years ago

Does your IAM solution really need an Agent?

Most IAM tools utilize browser extensions or applications installed on the end-user’s machine, or on an Active Directory, for access…

6 years ago