sso

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

Understand Web Access Management—Then Move On

Figuring out how to secure users’ connections to applications is an age-old challenge that has developed alongside the digital transformation of the enterprise. Traditionally, businesses have addressed this issue with complex authorization systems, many of which used web access management (WAM)—or on-premises single sign-on (SSO)—at the center of…

Centralized Access Management Needs to Be Secure and Selective

Give a kid free reign in a candy shop, and you know what will happen. They won't fill their bag with gummy bears alone—they’ll go for a mix of different treats! Gummy worms, sour patches, peanut butter cups, M&Ms, you know the list. Much like a kid in a candy shop, the modern employee now demands the freedom to use best of breed applications…

How Much Are Password Resets Costing Your Company?

Your users are trying to hit deadlines, prepare for meetings, and balance responsibilities. They don’t want to slow down to gain access to the apps and systems they need to get their job done. Yet often, users are frustrated by the expectation of memorizing the dozens of URLs, usernames, and passwords they need to do their work. Most people can’t…

Increase Business Agility by Reducing Your AD Footprint

When NASA re-engineered the space shuttle, they were heavily constrained by the size of the rocket boosters attached to it. These boosters were manufactured by an outside company and shipped by train, and thus limited by the size of American trains. U.S. train tracks were designed based on train tracks in the U.K., which were based on the old…

Archive