Blog

Part 1: Mitigating the risk of internal breach

Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...

read more

SSO on the go!

Where do you physically work? In an office? At home? At a table in your local coffee shop? It is becoming more common for employers to allow their employees to work outside the traditional office space. With the use of laptops, tablets and mobile devices there is...

read more

The Advantages of the Cloud

Cloud computing has opened up a new world of IT infrastructure that poses many advantages for organizations such as enhanced accessibility, scalability, cost efficiency and security. Let us take cloud based access workflows for example, they offer many advantages over...

read more

Web SSO vs Enterprise SSO

Currently, the number of applications and software solutions in use by businesses is increasing rapidly. It is not uncommon that one business may utilize dozens of applications, each with their own set of credentials for each user. Many of these applications (both on...

read more

SSRPM Saving the Helpdesk Time

Forgetting a password can be quite an ordeal without a self-service reset system in place. You have to call the help desk, provide your information, wait for a ticket to be created, be assisted by the next available agent or at times you may have to wait for a call...

read more

HelloID for the ‘Non-Techspert’

Do you ever find yourself nodding along when it comes to technology but not really knowing the in’s and out’s of what’s being said? The challenge (and beauty) of technology is that the second you're up to date, your information is old and has since evolved once again....

read more

Advanced Authentication Methods

In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape...

read more

Why SSO? Four Simple Ways SSO is Beneficial

With so many passwords to remember today, the answers are abundant: Single Sign-On solutions (SSO) have been around for a while now, and for good reason. They are extremely helpful for many areas of your organization and require minimal effort to implement and use....

read more

Three Ways Your Organization Can Ensure Security

It’s common sense: Data security is important in every industry. Every organization, thus, must deal with internal data or customer data which, if breached, can cause major issues for the organization, its team members and its customers. Here are three useful tips on...

read more

What is the Next Step in the Evolution of the Password?

Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to...

read more

To hack or not to hack?

Asking companies for their password policy on a regular basis, I find that many organizations have no strict policy on passwords, which results in an immediate risk to the organization. Microsoft's security best practice advice is to: let the password expire every 30...

read more

Maturity in Authorization management

Access Governance (AG) ensures that employees have the appropriate entitlements to perform their duties. A reliable Access Governance model makes sure that the proper base of entitlements are provisioned to them when starting a new job, transferring to a different...

read more

Speak with One of Our Technology Representatives