What Are Identity Risks and How Can They Be Mitigated?

IT security never gets easier. Since the COVID-19 pandemic hit, IT organisations have had to deal with constant, rapid change – from enabling a hybrid workforce to the mass adoption of cloud-based, SaaS tools and services. These shifts have moved employees and devices outside of the traditional security perimeter, making understanding who your…

How Does Identity Enhance Employee Experience?

Right now it seems as if everyone’s talking about the future of work. Will most companies follow in the footsteps of Goldman Sachs and JPMorgan and mandate their employees to return to the office on a full-time basis? Or will they adopt the more permissive approaches championed by tech companies like Twitter and Slack, and encourage people to work…

Should I Be Using Coarse- Or Fine-Grained Access Control?

Every business, from sole traders to the largest organisations, has to deal with data.   Internet users generate about 2.5 quintillion bytes of data every day: customer data, sales data, financial data, website statistics, and dozens of other types of business data likely sit bundled together on your servers. With all this information to manage,…

How Does Passwordless Authentication Improve UX?

They have formed the foundation of digital identity and security for half a century. Now the age of passwords is coming to an end. While it would be easy to just focus on how their demise impacts authentication and cybersecurity, in this blog we are going to look at what it means for user experience. Is passwordless authentication good for user…

Why Loginless is the Future of Authentication

It’s often said that familiarity breeds contempt. But psychological research reveals quite the opposite: the more people are exposed to something, the more they tend to like it — and the more likely they are to believe that it’s trustworthy and safe. This phenomenon may explain the persistence of the traditional username/password login box, which…

Keeping Your Applications Protected With a User Provisioning Policy

User provisioning has never been so important. The global pandemic has shifted employee expectations, and the emergence of highly distributed “work from anywhere” company cultures is changing the ebb and flow of the workforce. According to Slack, almost a third (29%) of UK workers are considering moving to a new job this year.  What’s more, 28% of…

The 10 Step Customer Identity Strategy Checklist

Do you know exactly what it takes to build a Customer Identity strategy? Read our 10-step checklist to help guide you to CIAM success. In a world where customer experience has overtaken price and product as the key brand differentiator, investing in customer identity and access management (CIAM) is a wise choice for any forward-thinking business…

What to Look for in a Modern Customer Identity Solution

The right CIAM solution is an asset to any modern business, but how do we identify what makes good customer identity? In this post, we explore the key features and capabilities every modern CIAM solution should offer.  The right customer identity and access management (CIAM) solution is an asset to any business. It ensures every digital…

Forum22: Europe’s Biggest Identity Event Returns to London

Trust is the glue that binds all business relationships together. It is the crucial element, ensuring organisations, their customers, workforces, partners, and suppliers can work productively and securely. But how can organisations build and maintain trust in an age when cyberattacks are at an all-time high and both workforce and customer…

Archive

Follow Us
Share on Linkedin Share on Youtube