Posted on 18 December 2013 by
We often talk about ‘business applications’ or ‘business software’ as if they belonged to a separate universe of applications. This makes sense – some applications (like HR software) only make sense in a business context. But there’s a lot of overlap in the people using the software. In fact, the people using your business applications […]
Posted on 20 February 2014 by
Here’s a familiar scenario: I hear about a great website/service that interests me. It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]
Posted on 30 July 2014 by
Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]
Posted on 02 November 2017 by
How do you implement a cloud access management solution? Cloud apps in the enterprise have become mainstream, but moving to cloud-based applications can be challenging. There’s way for you to streamline cloud adoption for everyone, follow these 4 easy steps.
Posted on 09 July 2018 by
A couple of weeks ago, the UK National Cyber Security Centre, a part of the British intelligence and security organization GCHQ, published guidelines for enterprise information security leaders on how they can implement multi-factor authentication to thwart breaches and unauthorized access to online accounts. The guidelines cover both consumer authentication to online services, such as banking […]
Posted on 20 August 2018 by
Are you a CISO or IT professional considering Microsoft AD FS as a solution to simplify access to multiple applications? While AD FS helps reduce the log on burden for end users by providing single sign on to applications or cloud services in an organization, it may not ultimately be sufficient for all your SSO and Cloud Access Management needs. In this regard, there are several points that CISOs may want to take into account when assessing the optimal solution for their access management needs.