March 14, 2018
The new Avaya Mobile Experience helps contact centers manage incoming calls from mobile phones. Analysts said the latest service could help reduce costs.
February 09, 2018
This week, bloggers assess the role of machine learning for network traffic routing, new hurdles for identity management due to the cloud and what to ask AI vendors.
August 29, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings ...
July 18, 2017
Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error.
IDaaS Get Started
Bring yourself up to speed with our introductory content
Where does the data live? Who -- the provider or the customer -- is responsible for securing what? They're vital questions to ask when mulling a cloud move, a new report posits. Continue Reading
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other. Continue Reading
Enterprises use multiple AWS regions for disaster recovery, but that practice can increase cloud costs and vulnerabilities. Manage access to regions to maintain control. Continue Reading
Hybrid cloud often is a goal for many enterprises, but getting there is a challenge. AWS has a host of hybrid cloud tools to build applications on and off premises. Continue Reading
Learn to apply best practices and optimize your operations.
The scenarios for installing cloud-based remote access are evolving as vendors bring to market new tools to aid both accessibility and security. Continue Reading
AWS recommends multi-factor authentication as a best practice for accounts that access administrative services. Here are some ways to apply MFA and prevent cloud access breaches. Continue Reading
Enterprises operate multiple AWS accounts for a variety of reasons. That approach, however, creates management woes. AWS Organizations automates and simplifies the process. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading