IDaaS
Introducing OCI IAM Identity Domains
A little over a year ago, I switched roles at Oracle and joined the Oracle Cloud Infrastructure (OCI) Product Management team working on Identity and Access Management (IAM) services. It's been an ...
Pushing the Limits of IDaaS with AMaaS
Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, ...
Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity
"Given the distributed nature of today’s technology environment, zero trust has become the standard for security. Every interaction must be authenticated and validated for every user accessing every system or application every ...
Facing the Facebook Breach: Why Simple SSO is Not Enough
Simple Single Sign On (SSO) offers clear advantages for enterprises, however, along with wide SSO solution implementation has come the risk associated with simple SSO. Learn why Smart SSO can mitigate Facebook-type ...
When Prince Harry Met Access Management
From The Royal Wedding to top secret projects, learn how fashion designers around the globe can keep their designs safe and ensure the security of their entire company. Discover five simple steps ...
Why customers have switched from RSA SecurID to Gemalto’s IDaaS
Learn the four key reasons why hundreds of customers have made the switch from RSA SecurID to Gemalto’s identity-as-a-service (IDaaS) offerings. While RSA was a pioneer in 2FA, Gemalto became a pioneer ...
Will GDPR Kill Risk-Based Authentication?
No, I’m not declaring another thing in identity management dead. Instead, I’d like you to join me in exploring something that has been bugging me quite a bit lately. Risk-based Authentication can ...
Next Generation IDaaS: Moving From Tactical to Strategic
Today, I posted a blog entry to the Oracle Identity Management blog titled Next Generation IDaaS: Moving From Tactical to Strategic. In the post, I examine the evolution of IDaaS and look ...
The Case for Hybrid Identity-as-a-Service (IDaaS) Part II
In Part II of a four part series, Michael Mongold, Director of Enterprise Technology for PasswordBank, describes the challenges facing end users as they are faced with more locations where they must ...
The Case for Hybrid Identity-as-a-Service
Hybrid Identity-as-a-Service (IDaaS) provides a clear path to reducing the dangers associated with cloud-adoption ...