Blog

Read more about the latest developments on Identity Governance & Administration

Ease authentication for young students with QR code logins

Learning and technology go together like the three R’s as it has become apparent that integrating technology into the classroom is an effective way of engaging students. There are, however, challenges with adopting technology in the classroom such as cost, administration and ease of use - particularly for younger students or students with special needs.

Read more

6 Things You Can do to Prevent Breaches

If You’re Havin’ Data Problems, We Feel Bad For You 99 Problems and a Breach Ain’t One When it comes to data breaches and hacking, Hollywood has conditioned us to envision the most ambitious targets of international mega-corporations’ intellectual property, government intelligence, or massive theft from financial institutions. But your school district has some pretty important Personally Identifiable Information (PII) stored for students and staff– and it likely requires less to access than Tom Cruise suspended from the server-room ceiling.

Read more

Balancing simple access with robust security

The days of securing a computer, application or website with a basic username and password are long gone. Hackers are more sophisticated than ever and the value of data is on the rise. To this end, advanced authentication, or multi-factor authentication, is becoming the norm. Advanced authentication adds an additional layer of security to the standard username and password, which is needed not only to protect data, but also to comply with strict regulations such as HIPAA, PCI-DSS, SOX and FERPA, to name but a few.

Read more

Category

Authentication Management

authentication as a service , adaptive authentication , risk based authentication , access management