How modern identity strategies shape enterprise security

Identity is no longer simply a login management system. It’s the most targeted layer in your infrastructure, and often the least connected. It's how users access data, how services interact, and, increasingly, how attackers get in. What used to be an admin function is now the foundation of your entire security posture. Our eBook, Secure Identity…

The problem with legacy thinking around identity security

You’ve probably heard the phrase “identity is the new perimeter.” It’s repeated often in security circles, and for good reason. In most companies, identity has long been considered a supporting function. It’s treated as a gateway to systems, a set of policies to manage access, and a line item on the security checklist.  But the landscape has…

What is ADFS (Active Directory Federation Services)?

Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD). Developed to provide flexibility,…

Security Questions: Best Practices, Examples, and Ideas

Security questions are a common method of identity authentication—one you’ve probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.  Typically, these security questions and answers are used for self-service password recovery…

User Management: An Afterthought for Some, Prerequisite for Others

You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system? This scenario may sound odd, but…

What is Decentralised Identity?

Decentralised identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralised and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralised framework, the user receives credentials from a number of issuers (e.g., government,…

What is SAML?

From CRMs for salespeople to invoice systems for accountants, the proliferation of SaaS web apps has made life easier for many employees. However, even the adoption of the most productivity-enhancing apps can lead to unintended inefficiencies and risks. These can range from frequent “I forgot my password” calls that inundate the IT department to…

What is a One-Time Password (OTP)?

A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. One-time passwords are created by an algorithm, that generates a unique value for each OTP by factoring in contextual information, like time-based data or previous login events. Tech support teams…

How Do Conditional Access Systems Work?

What is conditional access? Your organisation’s applications and resources are being accessed daily by employees located in hundreds of different locations. At the same time, hackers and other cyber criminals are looking for ways to access your sensitive data themselves, trying to exploit gaps in your authentication process. Conditional access is…

Archive

Follow Us
Share on Linkedin Share on Youtube