Identity Management Solutions
Identity Management Solutions | News, how-tos, features, reviews, and videos
Using open source for identity projects: 8 considerations
Consider these eight points to decide whether you can securely use open-source code in your identity management projects.
New US digital identity legislation promises more secure verification
COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.
What the use of open banking means for identity networks
By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.
5 best practices to secure single sign-on systems
Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.
Auth0 Signals analyzes logins to block bots
Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.
Why COVID-19 will change identity management forever
Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.
10 identity management metrics that matter
Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.
4 key problems with digital identity and why we need a new approach
To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.
The 10 most powerful cybersecurity companies
What makes these 10 security vendors the biggest power players? We break it down.
Authentication, identity management start-ups lead 2019 VC investing
Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.
What's ahead for digital identity in 2020?
Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.
4 authentication use cases: Which protocol to use?
Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.
Flex streamlines app access for 20k suppliers with IAM overhaul
Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.
Deepfakes and synthetic identity: More reasons to worry about identity theft
How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?
What is access control? A key component of data security
Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.
Taxpayer First Act: Improving identity verification and modernizing the IRS
With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.
Best tools for single sign-on (SSO)
SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.
Is the digital identity layer missing or just misplaced?
The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers.
-
Video/Webcast
Sponsored -
Analyst Report
Sponsored -
Data Sheet
Sponsored -
White Paper