May 23, 2018
Enterprise identity firm Okta used its Oktane 2018 conference and exhibition to release a number of new products and explain what it means by the term 'contextual' access management in relation to ...
March 14, 2018
The new Avaya Mobile Experience helps contact centers manage incoming calls from mobile phones. Analysts said the latest service could help reduce costs.
February 09, 2018
This week, bloggers assess the role of machine learning for network traffic routing, new hurdles for identity management due to the cloud and what to ask AI vendors.
August 29, 2017
Cloud identity authentication specialist Okta has used its Oktane 2017 conference and exhibition to extend the capabilities of its Okta Identity Cloud platform. To clarify, the firm now brings ...
IDaaS Get Started
Bring yourself up to speed with our introductory content
Where does the data live? Who -- the provider or the customer -- is responsible for securing what? They're vital questions to ask when mulling a cloud move, a new report posits. Continue Reading
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Like so many decisions in IT, choosing a cloud management tool takes time. Be sure to outline your key goals for resource deployment, cost monitoring and more. Continue Reading
With all the EMM products available, companies must know the major features that they offer and how the players stack up against each other. Continue Reading
Enterprises use multiple AWS regions for disaster recovery, but that practice can increase cloud costs and vulnerabilities. Manage access to regions to maintain control. Continue Reading
Learn to apply best practices and optimize your operations.
There's often an assumption that AWS systems can't be tested, as they're hosted in the cloud; however, this is not the case. Discover common security oversights in AWS environments. Continue Reading
Administrators tasked with cleaning up the Active Directory user group structure need not search any further. Use these tips to avoid Active Directory maintenance headaches. Continue Reading
The scenarios for installing cloud-based remote access are evolving as vendors bring to market new tools to aid both accessibility and security. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading