March 08, 2017
Identity cloud provider company Okta has snuggled up with identity management company Stormpath. Who brings what to the party? This new union is designed to bring forward Okta Identity Cloud as ...
August 31, 2016
Identity Manager provides user authentication and access control, both in the cloud and on-premises. VMware provided an overview of both models in a VMworld 2016 session.
August 30, 2016
Ping Identity CEO Andre Durand talks with SearchCloudSecurity about the benefits of identity as a service as well as the issues holding back greater enterprise adoption of IDaaS.
June 24, 2016
At the 2016 Cloud Identity Summit, security experts discussed how fears of nation-state attackers and APT groups are spurring a renewed focus on identity and access management.
IDaaS Get Started
Bring yourself up to speed with our introductory content
By controlling who sees what, identity and access management tools give a business a much better hand to play in the always tricky cloud security game. Continue Reading
Amazon Cognito is an Amazon Web Services (AWS) product that controls user authentication and access for mobile applications on internet-connected devices. The service helps to speed application development by saving and synchronizing end user data, freeing up time for the developer. Continue Reading
Identity and access management, or IAM, has long been a crucial consideration in the formulation of corporate security strategy. IAM policy today must contend with a variety of major changes sweeping the world of IT. One of the latest is the spread of cloud-based services, particularly the relativity new identity as a service. IDaaS and other products are having a significant impact on the market, as cloud-based IAM is now being released by both "establishment" players (i.e., Microsoft and Oracle) and next-gen companies like Ping Identity and Okta.
This Information Security magazine Insider Edition tackles these seismic changes in the "identity layer" and considers other factors affecting IAM policy now and how they have an impact. In addition, we look at multifactor authentication, which is an established identity security practice. But multifactor is not without its own challenges when to comes to implementation and maintenance. We also take a careful look at the specific risks to cloud-based IAM tools, from shadow IT, mobility and more.
Readers of the special edition of Information Security magazine on IAM policy and security concerns will come away better equipped to assess their current IAM policy and adapt it to the current and future world of IT.Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
IT policies must explicitly establish the identity of users and their rights to access resources. Otherwise, an organization will not meet the requirements of cloud computing. Continue Reading
The best SSO today can handle the apps mobile workers use, identity as a service and more. Learn to make single sign-on, and other identity management approaches, more effective. Continue Reading
Learn to apply best practices and optimize your operations.
Cloud security has been a major roadblock to adoption, but a phalanx of tools allows enterprises to customize an AWS security strategy for each situation. Continue Reading
The AWS free tier of service holds real value for tire kickers, giving them a head start in the AWS cloud, albeit with some limited tooling. Continue Reading
Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
When you implement cloud-based file sharing, make sure to establish authentication controls and register user devices. Continue Reading