Two-Factor Authentication (2FA) Explained: 2D Barcode Authentication

As part of our 2FA Explained series, we recently looked at magnetic stripe cards. Another authentication method that has long been in use and can be printed onto cards are 2D barcodes.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 2

In Part 1 of this series, we discussed the challenges that come with onboarding employees and granting access, specifically determining which permissions to give an employee, providing employees with day one access, and managing ad-hoc access requests.

Read More

Two-Factor Authentication (2FA) Explained: Magnetic Stripe Card

Today, there are many card-based options for controlling physical and network access. Although many organizations have transitioned to newer, more secure options, such as smart cards and RFID cards, others still have  magnetic stripe cards in place.

Read More

Meet Our Team: Melissa Bayless, Manager of Support Engineering

From managing global IT operations and large-scale projects to successfully revamping teams and systems for organizations with struggling IT departments, Melissa Bayless brings an extensive array of IT experience to Identity Automation. And we’re glad to have her on the team!

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 1

Identity lifecycle management presents a number of challenges: You need to quickly onboard employees so that they have access to the applications needed to do their jobs, you need to immediately offboard them when they leave the organization so they’re not a security threat, and you need to ensure IT isn’t bogged down with all changes in between as employees shift roles, get promoted, change locations, and so on.

Read More

Two-Factor Authentication (2FA) Explained: Social Login

Companies and end-users alike are constantly looking for authentication methods that lower barriers to entry and improve user experience without compromising security.

Read More

Healthcare Cybersecurity and the Human Factor: Using Risk-Based Authentication that Considers Behavioral Factors

In the healthcare industry, a lot of energy goes into driving practitioner efficiency and making patient data easier for clinicians to access. But is enough focus being put on security and protecting patient data?

News headlines indicate the answer is a resounding no. There have been a slew of notable healthcare breaches in recent years.

Read More

Two-Factor Authentication (2FA) Explained: Smart Cards

Smart cards are cards or cryptographic USB tokens that are used for a number of authentication purposes, including physical access (buildings, rooms), computer and network access, and some secure remote access solutions (virtual private networks (VPN), portals).

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Hard Tokens

One time passwords (OTPs) are a popular choice for organizations looking to increase their security posture with two-factor authentication. As a refresher, OTPs are unique passwords that are only valid for a single login session and a defined period of time.

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Soft Tokens

In today’s dynamic business environment, organizations are putting more and more pressure on users to increase productivity without sacrificing security. However, a company’s infrastructure needs to be nimble enough to meet these needs without negatively affecting user experience.

Read More

Subscribe Here!