identity and access management solutions

To Implement or Ignore: MFA for Custom Apps & Websites

Multi-factor authentication (MFA) is one of the most highly recommended security measures in this age of brute-force attacks, data breaches…

5 years ago

IAM using SSO and Federated Identity Management

Identity management encompasses several operational mechanisms for managing users across a large system or network of applications. Two of the…

5 years ago

Working Online? Watch out for Identity Theft!

Identity theft is as real as your identity and as dangerous as the one who steals it. It occurs when…

5 years ago

Cloud Security 101: Identity and Access Management

An Identity and Access Management (IAM) solution allows organizations to manage user access to critical data. It is an intermediate…

5 years ago

Meet GCP IAM: The Identity and Access Management Solution from Google

Google Cloud Platform (GCP) IAM comes as a free service that is available by default to all users of the…

5 years ago

Does your IAM solution really need an Agent?

Most IAM tools utilize browser extensions or applications installed on the end-user’s machine, or on an Active Directory, for access…

5 years ago

The What, Why and How of Two-factor Authentication (2FA): Decoded

Whether or not you know what it is called, you have likely used 2FA at least once in your life…

5 years ago

Akku – Secure your Enterprise Communication

Akku is a great way to control and authenticate communication channels for any enterprise. One of the biggest threats to…

5 years ago

Is Your Data Secure? No…

As per a survey by Forrester Research (Forrester Consulting Thought Leadership Paper, February 2017), in the last 4 years, out…

5 years ago

Password Security Threats

Most people use a Password Manager to save their account passwords. A password manager is an app or device which…

5 years ago