Insights and Outlooks from the Digital Identity Market Leader

Dec 5, 2016 3:29:01 PM
How Are Achieving Cyber Security Compliance and a Truly Secure State Different? Achieving Compliance is Not Equivalent to Achieving an Actual Secure State The backdrop of today’s information security landscape is riddled with dema [...]
Oct 25, 2016 12:00:36 PM
IT and Compliance Departments Working Together With Greater Frequency The Integration between IT and Compliance Presently, a marked shift from the silos of IT and compliance teams is resulting in a departmental convergence for man [...]
Jul 3, 2014 7:22:19 AM
An ITIL implementation in your organization can be confusing. This section explains exactly why we implement ITIL for our services and processes. In Continual Service Improvement (CSI), we have a couple of different models that we [...]
Jun 25, 2014 11:56:00 AM
A client recently requested the ability to use data in an externally-generated file to perform batch attribute updates for Users in the FIM Service. What made this more complicated than expected was that some of the user attribute [...]
Jun 18, 2014 6:27:00 AM
At first, this question might initially seem like an apples vs. oranges situation. We’ll find out that in some cases it’s not, and that making the best strategic choice for your needs depends on a number of factors.
Jun 9, 2014 10:24:18 AM
A leader in the educational software market was developing a custom MDM solution enabling a Bring Your Own Device (BYOD) initiative for the classroom when their developers realized their need for an underlying security and Public [...]
May 12, 2014 9:56:15 AM
With Windows AAD (Azure Active Directory), ADFS 3.0 (Active Directory Federation Service), and OWIN (Open Web Interface for .NET), you will find your corporate individual core identity, making connections between your corporation [...]