August 29, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings ...
July 18, 2017
Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error.
June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
March 08, 2017
Identity cloud provider company Okta has snuggled up with identity management company Stormpath. Who brings what to the party? This new union is designed to bring forward Okta Identity Cloud as ...
IDaaS Get Started
Bring yourself up to speed with our introductory content
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other. Continue Reading
Enterprises use multiple AWS regions for disaster recovery, but that practice can increase cloud costs and vulnerabilities. Manage access to regions to maintain control. Continue Reading
Hybrid cloud often is a goal for many enterprises, but getting there is a challenge. AWS has a host of hybrid cloud tools to build applications on and off premises. Continue Reading
Learn to apply best practices and optimize your operations.
The scenarios for installing cloud-based remote access are evolving as vendors bring to market new tools to aid both accessibility and security. Continue Reading
AWS recommends multi-factor authentication as a best practice for accounts that access administrative services. Here are some ways to apply MFA and prevent cloud access breaches. Continue Reading
Enterprises operate multiple AWS accounts for a variety of reasons. That approach, however, creates management woes. AWS Organizations automates and simplifies the process. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading