Why token based authentication is a thing?
Repeatedly sending credentials over the internet is a security risk. But when you need to sign in to cloud and web-based apps, it is unavoidable. Or is it? Token-based authentication…
Repeatedly sending credentials over the internet is a security risk. But when you need to sign in to cloud and web-based apps, it is unavoidable. Or is it? Token-based authentication…
You’ve probably heard the term being thrown around in the last couple of years. Maybe you don’t fully know what it means, or maybe don’t know at all. You’ve got…
There’s something brewing in the world of IAM that could change your business’ future. Here’s a first taste! Converged IAM is the biggest buzzword in IAM today. According to industry…
Adaptive Authentication, also called risk-based or contextual authentication, analyzes multiple things by considering context and behavior when authenticating and uses these values to assign a level of risk associated with…
“The Telephone did not come into existence from the persistent improvement of the postcard.” Constant morphing of the technology landscape demands an appropriate answer from IAM. While IAM tools are…