How Mobile Is Changing the Face of Identity Management

Two of the biggest recent IT trends have been cloud computing and mobile, and they are changing the approach we take to managing mobile identity. Connecting mobile apps to cloud-based services has revolutionized the way in which we create and consume digital information. Much of the growth in mobile and cloud computing has been driven…

How Risk-Based Authentication Can Improve the Authentication Experience

Authentication should be both as reassuring and as transparent as possible to the user. Risk-based authentication (RBA) can improve the authentication experience if used correctly. Users want an authentication solution to be strong enough to protect their digital assets, but they do not want to be inconvenienced with clunky technology that negatively affects their experience.…

Next Generation Authentication: Meeting the Needs for Today’s Service-Oriented IT

Next generation authentication solutions are being designed and introduced as a reaction to a number of interconnected IT megatrends. These trends have created a situation in which traditional authentication solutions don’t meet enough of the demands of changing IT service delivery. The rise of mobile computing, delivery of IT services through a mixture of on-premise…

Are You Struggling with Account and Entitlement Reviews?

Account and entitlement reviews can be time-consuming and prone to errors if carried out manually. The process is further complicated if your Identity and Access Management (IAM) solution is heavily dependent on unstructured data and your IAM tools are poor at identifying who owns the data. These reviews are not traditionally part of an organization’s…

How Transaction Monitoring Can Provide Much-Needed Visibility

Knowing what your customers are doing when accessing your online service is imperative to meeting regulatory requirements and reducing fraudulent activity. Transaction monitoring can be an effective tool in providing organizations with visibility in post-authentication events. 2014 has seen an upswing in cybercrime attacks that have directly led to financial fraud, with results from the…