Blog

Read more about the latest developments on Identity Governance & Administration

Managing a 1:1 learning environment in K-12

It’s no secret that Kindergarten – 12th grade is quickly moving to an eLearning environment. Research has shown that implementing 1:1 technology programs in the classroom can significantly increase student motivation, engagement and collaboration. Accordingly, schools across the country are purchasing laptops, Chromebooks and tablets, pushing the boundaries to further education.

Read more

Managing a 1:1 learning environment in K-12

It’s no secret that Kindergarten – 12th grade is quickly moving to an eLearning environment. Research has shown that implementing 1:1 technology programs in the classroom can significantly increase student motivation, engagement and collaboration. Accordingly, schools across the country are purchasing laptops, Chromebooks and tablets, pushing the boundaries to further education.

Read more

Part 2: Mitigating the risk of internal breach

In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization’s network. Today we are going to discuss how to take it a step further, and protect against these internal threats in a hybrid IT environment. There are many solutions on the market focused solely on cloud data protection or network data protection. We have found the reality of most IT environments to be a combination of both. To best offer guidance in protecting against internal threats, let’s look to a hybrid solution for a hybrid problem; namely, HelloID.

Read more

Category

Single Sign On

Self-Service , Workflow Management , IDaaS , Two-factor Authentication