August 29, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings ...
July 18, 2017
Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error.
June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
March 08, 2017
Identity cloud provider company Okta has snuggled up with identity management company Stormpath. Who brings what to the party? This new union is designed to bring forward Okta Identity Cloud as ...
IDaaS Get Started
Bring yourself up to speed with our introductory content
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
Enterprises can never be too careful when it comes to security. Protect your Azure deployment with multiple verification methods and devices -- without putting a burden on users. Continue Reading
Our environment has multiple AWS accounts for different dev stages. How can we use the IAM cross-account feature to share resources across accounts? Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises use multiple AWS regions for disaster recovery, but that practice can increase cloud costs and vulnerabilities. Manage access to regions to maintain control. Continue Reading
Hybrid cloud often is a goal for many enterprises, but getting there is a challenge. AWS has a host of hybrid cloud tools to build applications on and off premises. Continue Reading
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
Learn to apply best practices and optimize your operations.
The scenarios for installing cloud-based remote access are evolving as vendors bring to market new tools to aid both accessibility and security. Continue Reading
AWS recommends multi-factor authentication as a best practice for accounts that access administrative services. Here are some ways to apply MFA and prevent cloud access breaches. Continue Reading
Enterprises operate multiple AWS accounts for a variety of reasons. That approach, however, creates management woes. AWS Organizations automates and simplifies the process. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading