Category: Identity and Access Management

The simpler way to manage Remote Employee Onboarding

When onboarding new employees, it’s important to keep the process as simple as possible. When all new user activity occurs…

4 years ago

Identifying Training Opportunities and Boosting Productivity with a User Activity Monitoring (UAM) tool

User Activity Monitoring tools (UAMs) have a bad rep, with many employees believing that they are used by employers for…

4 years ago

When should you implement an IAM solution?

In which stage of the user or employee lifecycle should an IAM solution ideally be implemented? The answer is: Right…

4 years ago

How does a true PAM work?

A Privileged Access Management (PAM) solution helps to secure and control privileged access to critical software and assets. Credentials and…

4 years ago

Think beyond Active Directory for hybrid working

In 2020, the pandemic had a major impact on security and cyberattacks. The year saw the highest number of data…

4 years ago

Data Logging and Audit: The IAM advantage

One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…

4 years ago

Flexible Identity: IAM solutions need to bend… a little at least!

In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…

4 years ago

Authentication, Authorization, Auditing: the Three Pillars of IAM

In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…

4 years ago

Passwordless Authentication 101: What it is, How you can adopt it, and Why it’s the future

To stick with passwords or to go passwordless is a million-dollar cyber security question. Resetting, remembering, and changing passwords regularly…

4 years ago

How to select your IAM service provider

Given the increasing number of cyber-attacks, greater adoption of Cloud Services, and swelling mobile workforce, it’s little wonder that IAM…

4 years ago