single sign on

Passwordless Authentication 101: What it is, How you can adopt it, and Why it’s the future

To stick with passwords or to go passwordless is a million-dollar cyber security question. Resetting, remembering, and changing passwords regularly…

2 years ago

What are some alternatives to Okta?

In this new world of remote working and cloud enterprises, Identity and Access Management (IAM) has been thrust to the…

2 years ago

Protect your Business from Privilege Abuse with IAM

Privilege abuse - that is the security threat that your business’s IT team is most worried about. According to a…

5 years ago

Why data breaches happen & what you can do to stop them

War seems to have taken a new form in the Information age. Large corporations have reported increased data breaches in…

5 years ago

Meet GCP IAM: The Identity and Access Management Solution from Google

Google Cloud Platform (GCP) IAM comes as a free service that is available by default to all users of the…

5 years ago

Akku – Secure your Enterprise Communication

Akku is a great way to control and authenticate communication channels for any enterprise. One of the biggest threats to…

5 years ago

Secure and Easy User Management: SCIM through the Fundamentals

What is SCIM? The System for Cross-domain Identity Management (SCIM) is an open standard specification, designed to make user management…

5 years ago

How an Identity and Access Management Solution Can Help Your Data Driven Business

Cloud technology has broken several operational barriers to make remote data access easy. It allows you to scale your business…

6 years ago

A Single Login To Access All Your Applications

Logging on to different applications using different user credentials every single time is frustrating, isn’t it? The use of a…

6 years ago

What is an IAM ?

Identity and Access Management (or IAM) solutions - also known as Identity Management (IdM) solutions - form a critical component…

6 years ago