Posted on 15 February 2019 by Sarah Lefavrais
Nearly 10,000 people were present in Lille, in Northern France, on January 22 and 23 to participate in the FIC (International Cybersecurity Forum). This meeting brings together the main French and European players in Cybersecurity. As this year was my first time attending, it was a great opportunity to observe Access Management trends and issues.
Posted on 08 August 2018 by Thales DIS
Reddit has been hacked! Their SMS based authentication was not strong enough to prevent a breach, so they will be moving towards token-based two-factor authentication (2FA)—will that be enough? Discover how a strong cloud access management solution with multifactor authentication could take data protection to new levels
Posted on 11 July 2018 by Thales DIS
In this series about considering access management, we’ve explored ideas around why organizations are adopting IAM solutions, what applications need to be protected and what users need to have access. In this post, we will consider how users authenticate to applications and resources and why it’s the most important thing that needs to be considered.
Posted on 10 July 2018 by Thales DIS
We’ve explored why organizations are considering implementing identity and access management solutions (IAM). The solution should not only consider WHO and WHAT needs to be protected; read on to find out why the solution needs to have the ability to create access controls around WHERE the access attempts are coming from.
Posted on 03 July 2018 by Thales DIS
When looking at IAM solutions it is important to consider WHO needs to validated and WHAT needs to have access controls around it. The most comprehensive IAM solutions that are offered help organizations manage all of their applications and enforced strong authentication where needed under appropriate access policies.
Posted on 19 June 2018 by Thales DIS
From The Royal Wedding to top secret projects, learn how fashion designers around the globe can keep their designs safe and ensure the security of their entire company. Discover five simple steps to access management and how SafeNet’s Identity and Access Management Solution as a service can assist.