Introducing OCI IAM Identity Domains

| | iam, IDaaS, identity, OCI IAM, Oracle
A little over a year ago, I switched roles at Oracle and joined the Oracle Cloud Infrastructure (OCI) Product Management team working on Identity and Access Management (IAM) services. It's been an ...
authentication, security, systhetic identity fraud, user management CyberArk identity authentication biometricsidentity AMaaS identity fraud authentication Stealthbits

Pushing the Limits of IDaaS with AMaaS

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, ...
Security Boulevard
Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity

Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity

"Given the distributed nature of today’s technology environment, zero trust has become the standard for security. Every interaction must be authenticated and validated for every user accessing every system or application every ...
Gemalto SafeNet Trusted Access Demo

Facing the Facebook Breach: Why Simple SSO is Not Enough

Simple Single Sign On (SSO) offers clear advantages for enterprises, however, along with wide SSO solution implementation has come the risk associated with simple SSO. Learn why Smart SSO can mitigate Facebook-type ...
How To Set Up An Identity Provider In Minutes For Single Sign-On

When Prince Harry Met Access Management

From The Royal Wedding to top secret projects, learn how fashion designers around the globe can keep their designs safe and ensure the security of their entire company. Discover five simple steps ...
Eliminate 3-year Token Renewals with SafeNet Trusted Access

Why customers have switched from RSA SecurID to Gemalto’s IDaaS

| | IDaaS, Uncategorized
Learn the four key reasons why hundreds of customers have made the switch from RSA SecurID to Gemalto’s identity-as-a-service (IDaaS) offerings. While RSA was a pioneer in 2FA, Gemalto became a pioneer ...
Will GDPR Kill Risk-Based Authentication?

Will GDPR Kill Risk-Based Authentication?

No, I’m not declaring another thing in identity management dead. Instead, I’d like you to join me in exploring something that has been bugging me quite a bit lately. Risk-based Authentication can ...

Next Generation IDaaS: Moving From Tactical to Strategic

Today, I posted a blog entry to the Oracle Identity Management blog titled Next Generation IDaaS: Moving From Tactical to Strategic. In the post, I examine the evolution of IDaaS and look ...
The Case for Hybrid Identity-as-a-Service (IDaaS) Part II

The Case for Hybrid Identity-as-a-Service (IDaaS) Part II

In Part II of a four part series, Michael Mongold, Director of Enterprise Technology for PasswordBank, describes the challenges facing end users as they are faced with more locations where they must ...
The Case for Hybrid Identity-as-a-Service

The Case for Hybrid Identity-as-a-Service

Hybrid Identity-as-a-Service (IDaaS) provides a clear path to reducing the dangers associated with cloud-adoption ...