Blog

SSO on the go!

Where do you physically work? In an office? At home? At a table in your local coffee shop? It is becoming more common for employers to allow their employees to work outside the traditional office space. With the use of laptops, tablets and mobile devices there is little reason for an employee to...

read more

The Advantages of the Cloud

Cloud computing has opened up a new world of IT infrastructure that poses many advantages for organizations such as enhanced accessibility, scalability, cost efficiency and security. Let us take cloud based access workflows for example, they offer many advantages over traditional self-hosted...

read more

Web SSO vs Enterprise SSO

Currently, the number of applications and software solutions in use by businesses is increasing rapidly. It is not uncommon that one business may utilize dozens of applications, each with their own set of credentials for each user. Many of these applications (both on premise and cloud-based) have...

read more

SSRPM Saving the Helpdesk Time

Forgetting a password can be quite an ordeal without a self-service reset system in place. You have to call the help desk, provide your information, wait for a ticket to be created, be assisted by the next available agent or at times you may have to wait for a call back. Where this gets even more...

read more

Access Governance Solutions Ensure Network Security Compliance

In a corporate environment, the most important aspect of protecting the security of your network is by leveraging software to ensure users do not have permissions to files and applications that they should not be able to access.  There are many ways you can leverage software to ensure proper...

read more

HelloID for the ‘Non-Techspert’

Do you ever find yourself nodding along when it comes to technology but not really knowing the in’s and out’s of what’s being said? The challenge (and beauty) of technology is that the second you're up to date, your information is old and has since evolved once again. As a  with a relatively good...

read more

Advanced Authentication Methods

In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape our technological landscape...

read more

Why SSO? Four Simple Ways SSO is Beneficial

With so many passwords to remember today, the answers are abundant: Single Sign-On solutions (SSO) have been around for a while now, and for good reason. They are extremely helpful for many areas of your organization and require minimal effort to implement and use. Here are four ways that SSO is...

read more

Three Ways Your Organization Can Ensure Security

It’s common sense: Data security is important in every industry. Every organization, thus, must deal with internal data or customer data which, if breached, can cause major issues for the organization, its team members and its customers. Here are three useful tips on how to ensure security!...

read more

What is the Next Step in the Evolution of the Password?

Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to allow multiple researchers to...

read more

To hack or not to hack?

Asking companies for their password policy on a regular basis, I find that many organizations have no strict policy on passwords, which results in an immediate risk to the organization. Microsoft's security best practice advice is to: let the password expire every 30 to 90 days, to enforce...

read more

Maturity in Authorization management

Access Governance (AG) ensures that employees have the appropriate entitlements to perform their duties. A reliable Access Governance model makes sure that the proper base of entitlements are provisioned to them when starting a new job, transferring to a different department or begin start working...

read more

How to Ensure Against Duplicate User Accounts In Your Network

When integrating an Identity & Access Management automated routine with a human resource system, locating a unique identifier to be used across each system is key. Typically, the employee ID or social security number is optimal, as it unique to each employee. Within many industries, it is...

read more

Easy Authorization Requests & Requisitions

Authorization requests and requisitions are a part of life for most businesses. Employees make all types of requests for purchasing equipment, role changes or requesting additional access to systems/ applications. Authorization request processes may have different details, but they generally...

read more

Speak with One of Our Technology Representatives