Enforce Device-based Restrictions with Akku

One of the biggest benefits of cloud computing is the level of accessibility it enables - from anywhere, and at…

6 years ago

Myths about Multi-factor Authentication

When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…

6 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago

Overcoming the Challenges of the Media Industry With Identity

When the digital revolution started, media companies were among the first ones to embrace it. Today, most media companies create…

6 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

6 years ago

Web Authentication – The Future of Going Passwordless

Best practices and common sense dictate that we use unique, hard-to-guess passwords for each application that we use. However, most…

6 years ago

What is ADFS and why do you need it?

ADFS (Active Directory Federation Services) is an SSO solution created by Microsoft to authenticate users logging into applications which are…

6 years ago

Customer Identity and Access Management – How is it different from IAM?

For organizations, it is crucial to ensure data security and, therefore, IAM has become a crucial part of every network…

6 years ago

User Lifecycle Management made easy with Akku

The employee lifecycle is an HR model that identifies the different stages an employee goes through during his/her stint at…

6 years ago

Prevent Online Identity Theft with Akku

Online identity theft, simply put, is impersonation on an online platform. If someone else pretends to be you -- either…

6 years ago