Data Logging and Audit: The IAM advantage

One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…

4 years ago

Flexible Identity: IAM solutions need to bend… a little at least!

In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…

4 years ago

Authentication, Authorization, Auditing: the Three Pillars of IAM

In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…

4 years ago

Passwordless Authentication 101: What it is, How you can adopt it, and Why it’s the future

To stick with passwords or to go passwordless is a million-dollar cyber security question. Resetting, remembering, and changing passwords regularly…

4 years ago

How to select your IAM service provider

Given the increasing number of cyber-attacks, greater adoption of Cloud Services, and swelling mobile workforce, it’s little wonder that IAM…

4 years ago

Transitioning from a legacy IAM to an interwoven Identity Fabric

With the emergence of cloud apps, identities need to be managed outside the traditional network. This has introduced new security…

4 years ago

What is CASB? How has data security changed with the cloud?

A Cloud Access Security Broker (CASB) is an on-premises or cloud-based security policy point-of-enforcement. Originally, asset security was simpler since…

4 years ago

What are some alternatives to Okta?

In this new world of remote working and cloud enterprises, Identity and Access Management (IAM) has been thrust to the…

4 years ago

HR productivity being sapped by On- and Off-boarding, L&D, and Compliance? An IAM could be what’s missing.

The synergy between Identity and Access Management (IAM) and IT, cybersecurity, and admin departments of an organization is obvious, but…

4 years ago

Increased security often means reduced efficiency. Here are 4 ways an IAM can boost productivity while staying secure.

Identity Access Management (IAM) is a collective term that covers processes and policies to manage user identities and regulate user…

4 years ago