Posted on 11 September 2019 by
Thales brings to the market SafeNet Trusted Access, an intelligent access management service that allows customers to enforce the perfect balance between user convenience and secure access to all apps. SafeNet Trusted Access offers flexible access management through a simple to use policy engine that gives customers real-time control over the ability to enforce policies at the group or application level.
Posted on 04 June 2019 by
As the EU embarked on a new relationship with the GDPR (General Data Protection Regulation) Council, new regulations were firmly implemented on May 25th, 2018. Companies across Europe had to find new ways of working while better managing their data privacy. Read more about finding harmony between GDPR and the Cloud now one year later since GDPR’s implementation.
Posted on 02 April 2019 by
Today marks an exciting milestone as Thales and Gemalto become one company. As a result of the combination of these two global leaders in digital security, Thales eSecurity and Gemalto’s Enterprise & Cybersecurity business are joining together as Thales Cloud Protection & Licensing, creating the world leader in cloud, data and software protection. It’s […]
Posted on 15 February 2019 by
Nearly 10,000 people were present in Lille, in Northern France, on January 22 and 23 to participate in the FIC (International Cybersecurity Forum). This meeting brings together the main French and European players in Cybersecurity. As this year was my first time attending, it was a great opportunity to observe Access Management trends and issues.
Posted on 08 August 2018 by
Reddit has been hacked! Their SMS based authentication was not strong enough to prevent a breach, so they will be moving towards token-based two-factor authentication (2FA)—will that be enough? Discover how a strong cloud access management solution with multifactor authentication could take data protection to new levels
Posted on 11 July 2018 by
In this series about considering access management, we’ve explored ideas around why organizations are adopting IAM solutions, what applications need to be protected and what users need to have access. In this post, we will consider how users authenticate to applications and resources and why it’s the most important thing that needs to be considered.