Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part One

By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. In fact, according to the 2017 Verizon Data Breach Report, over 80% of hacking related breaches are due to weak or stolen passwords.

Read More

Federated Identity Management: A Logical First Step in the IAM Maturity Model

Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenants, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move to cloud- or SaaS-based applications and are still manually creating users and passwords.

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 1 - Social Attacks & Phishing Schemes

In healthcare, the pressure is always on to drive down overall costs and provide higher levels of patient care. The result: a never-ending quest to increase efficiency. EMR’s, telehealth tools, and other third-party IT solutions that enhance productivity and streamline clinician workflows have become the norm.

Read More

Modern IAM and the Student and Alumni Experience

Delivering an optimal student and alumni experience is top requirement for CIOs at higher education institutions. More and more, this puts pressure on them to provide an optimal digital experience, as technology and cloud resources continue to play a growing role on college campuses.

Read More

Choosing the Right Proximity Badge Access Solution for Your Healthcare Organization

In busy hospital settings, clinicians move from room to room and department to department. They require multiple logins as they switch from one workstation to another and access multiple endpoint devices, such as thick and thin clients running Windows- or Linux-based operating systems.

Read More

Two-Factor Authentication (2FA) Explained: Email and SMS OTPs

One time passwords (OTPs) are a popular choice for organizations looking to step up their security with two-factor authentication (2FA). These randomly generated passwords are only valid for a single login session and overcome many of the vulnerabilities of traditional passwords.

Read More

Two-Factor Authentication (2FA) Explained: Challenge Response Authentication

Challenge/Response, also known as knowledge-based authentication, is a form of authentication where users verify their identities by answering “challenge” questions based on personal information about the user.

Read More

Two-Factor Authentication (2FA) Explained: Push Notifications

More and more, organizations are looking for cost-effective alternatives to traditional passwords that increase security without affecting usability. Many people believe that push notification authentication, a newer mobile-based authentication method, could be the answer.

Read More

Subscribe Here!