Alternative Authentication for Students, Part 2 - Pictograph Authentication


Technology in the classroom creates usability issues for very young students in pre-k, kindergarten, and first grade, as well as special education students. For many of these students, remembering and typing even simple usernames and traditional passwords is a struggle.

Read More

Alternative Authentication for Students, Part 1 - QR Code Badges



Schools are integrating technology and cloud resources into the classroom with ever-growing frequency. Overall education technology spending is expected to reach $19 billion by 2019 on a global scale. It’s easy to see why: Technology in the classroom has the ability to increase collaboration and productivity, create a more personalized learning experience, and enable teachers to distribute assignments and provide real-time feedback.

Read More

Meeting Compliance Requirements - What Your Organization Should Know

Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.

Read More

Retail Data Breach Update: Top 3 Cyber Threats To Retailers and how IAM Can Help

While the volume of cyberattacks is on the rise across the board—attacks are up 100 percent since 2015—retail is particularly at risk. And the numbers back that up.

One study found that retailers respond to cyberattacks on average twice a week, with an astonishing 16 percent experiencing attempted attacks daily.

Read More

Delegated Administration of User Accounts Part 3 - The Delegation Model

We recently wrote about delegated administration, a powerful Identity and Access Management (IAM) system feature and how it gives organizations the ability to assign control of of activities directly to business managers and system owners, as well as some common use case scenarios.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

Delegated Administration of User Accounts Part 2 - Delegation Examples

In part 1 of our delegated administration blog series, we discussed how delegation is an Identity and Access Management (IAM) system feature that gives authorized individuals or groups of users the ability to view another user’s data and take some form of action on that user's account.

Read More

Two-Factor Authentication (2FA) Explained: Biometric Authentication

With multi-factor authentication (MFA), there are three types of authentication factors: something you know (knowledge), something you have (possession), and something you are (inherence).

Read More

Assigning Authentication Risk Levels, the Problem with the Traditional Approach

The employees in your organization are all different. There are people in marketing and finance and HR. There are people who always work from the office, those who always work from home, and those always on the road. Some employees need lots of access to sensitive data and systems to do their job, while others only need basic access to standard applications.

Read More

Two-Factor Authentication (2FA) Explained: Bluetooth Authentication

In today’s world of increasing cyberthreats, more and more pressure is being put on companies to increase security with stringent authentication processes. However, companies and their users seek methods that won’t negatively impact user experience.

Read More

Subscribe Here!