Authentication & authorization News
February 19, 2016
Securing AWS starts with knowing what mistakes to avoid. So, to get off on the right foot, learn from these cautionary tales of common AWS security blunders.
January 20, 2016
New surveys from Kaseya and Clutch indicate continuing demand for managed services and suggest companies offering a wider range of services may see the highest growth.
August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
July 02, 2015
When Carlisle Construction Materials needed help going cloud-first, it turned to Okta not just for IAM but, later, its new EMM suite.
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
MSPs are pushing beyond traditional services such as patch and firewall management as they look to stand out from other companies offering managed IT security services. Continue Reading
Mobile application design isn't always easy. An effective design keeps user experience at the forefront of the design process. Without that, an enterprise mobile app could fail. Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile apps are constantly connected, which makes mobile backend as a service ideal for running business logic and data analysis. Here's what you need to know about cloud back-end services. Continue Reading
EMM vendors consolidate tools for enterprise mobility management, covering device, application and even identity management, into ‘single-pane-of-glass' management consoles. Continue Reading
Virtual EPC presents mobile operators with significant new business opportunities, including the chance to participate in the growing IoT market. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security missteps, it's essential to plan early and carefully.
This handbook looks at various secure testing strategies to ensure software safety now. In the first article, Gerie Owen covers the basic security measures to avoid getting hacked and advocates the importance of thinking like a hacker. In part two, Valerie Silverthorne views security from an Agile development perspective and examines how to reduce software vulnerabilities. Finally, Amy Reichert-Browerstock closes out the handbook with website penetration testing techniques for a regular testing cycle and how to check for security defects at the start of a test cycle. Guarantee protected software with these security actions.Continue Reading
One way to achieve software-defined network security is to implement a no-touch approach to networking administration. Learn how it can be done, and what needs to change before it’s possible. Continue Reading
Can the new Amazon API Gateway help make the AWS public cloud networks more secure? Expert Dan Sullivan examines how this new tool can benefit enterprises. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading
Before utilizing cloud database services, there are several security considerations to keep in mind and prepare for. Expert Dan Sullivan explains. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading