Identity Automation Blog

What is Adaptive Authentication?

Adaptive authentication is a term that you may be hearing more and more within the industry. Analysts are talking about it and so are many vendors, but what is it exactly?

Read More

The Complications of a Non-SSO World

Last week I wrote a post explaining the details of single sign-on, commonly referred to as SSO. I discussed what it is, what it means, how it’s used and why it’s valuable. But today, why don’t we look at the opposite side of the spectrum - what life would be like without SSO. It’s an interesting question to consider because so many companies now utilize SSO, but it wasn’t too long ago that this was our reality.

Read More

Freemium, But With a Security Premium



As educational apps continue to rise in popularity in school districts across the country, educational technology administrators find themselves inundated. Just as quickly as IT can clear new applications for use, new ones crop up in classrooms - often without passing an IT review. This is the current state of the freemium application model in education, and it’s one that is creating a perpetual tug of war between teaching staffs and school technology departments.

Read More

Guidebook: Assigning Risk Levels & Choosing Authentication Policies

Assigning risk levels for each employee in your organization can be tricky. The highest risk users and lowest risk users may be obvious, but what about all those users in between? You can't necessarily group them all together. How do you make that decision for each user?

Read More

What is Single Sign-On?


If you work in the IT department or have contact with colleagues who do, you have most likely heard the term “single sign-on” (SSO). While it seems like a straight-forward description of a login technique, I’ve heard people describe it in a number of different ways.

Read More

3 Ways Retailers Can Use Identity Management to Improve Efficiency

The retail landscape is changing quickly and evolving like never before. Internet and multi-channel retailing have completely altered the way people shop and do business today. Retail IT Departments are now charged with managing higher volumes of employees and customer access requests. Identity management is here to help those understaffed IT departments keep up with the flood. Here's how:

Read More

IoT Affects the Enterprise Too

The Internet of Things (IoT) has become a very popular topic with the media and bloggers over the past few years. When it’s discussed, it’s typically in association with consumer devices, an aspect I never gave much thought to until last week when I was discussing the 2013 Target breach, and this post from Brian Krebs in particular, with a colleague.

Read More

Authentication Methods: How to Beef up Your Cybersecurity Without a Password

In our most recent blog post on RapidIdentity 3.5, we announced the new authentication methods available to our customers. Each of these authentication methods fall under the three standard types of authentication required of users: something the user knows, something they have, or something that they are. In announcing these new authentication methods, we’re supporting our larger multi-factor authentication vision and the ability for users to utilize the authentication methods that work best for them rather than simply having passwords forced on them.

Read More

What is Multi-Factor Authentication?

Yesterday we announced RapidIdentity 3.5 and unveiled our vision for multi-factor authentication.

Today we thought we'd provide a little refresher on the basics of MFA and its benefits. Check out the graphic below to learn more.

Read More

RapidIdentity 3.5: Our Multi-Factor Authentication Vision

Today we announced RapidIdentity 3.5, the latest generation of our identity and access management solution. In making that announcement, we’re also revealing our vision for multi-factor authentication.

Read More

Subscribe Here!