Blog

Read more about the latest developments on Identity Governance & Administration

Ease authentication for young students with QR code logins

Learning and technology go together like the three R’s as it has become apparent that integrating technology into the classroom is an effective way of engaging students. There are, however, challenges with adopting technology in the classroom such as cost, administration and ease of use - particularly for younger students or students with special needs.

Read more

Balancing simple access with robust security

The days of securing a computer, application or website with a basic username and password are long gone. Hackers are more sophisticated than ever and the value of data is on the rise. To this end, advanced authentication, or multi-factor authentication, is becoming the norm. Advanced authentication adds an additional layer of security to the standard username and password, which is needed not only to protect data, but also to comply with strict regulations such as HIPAA, PCI-DSS, SOX and FERPA, to name but a few.

Read more

Category

Authentication Management

authentication as a service , adaptive authentication , risk based authentication , access management

What is a good password and why do you need one?

Would you leave the door to your house unlocked if you weren’t home? Would you leave the keys in your car if you weren’t in it? I assume the answer to both these questions are “no”. Why would you want to leave your personal property unattended, when is there a chance something might be stolen? Similar questions can be asked regarding password management. How complex are your passwords? Do you feel as comfortable storing your personal and business information on your computer, as you do leaving your home locked and protected?

Read more