Of ‘Things’ and ‘Strings’

3rd March 2017

It requires a consistent reorientation and adjustment of current technologies and methods to meet the upcoming challenges of Identity Management.


CISO should be the dyke warden of IT security

2nd March 2017

Ian Yoxall, Principal Consultant, Intragen When it comes to IT security, many people have an SEP (Somebody Else’s Problem) mentality. Responsibility for security cannot be outsourced. It […]


Facebook ups its security with two-factor authentication

9th February 2017

The social media powerhouse has become the latest online service to improve its login security with the introduction of Fido U2F security keys.


USG People Identity for branding

22nd March 2016

Close interaction with clients, organisations and customers 


NXP Semiconductors embraces cloud security

NXP chooses hybrid IAM solution to support global Cloud strategy 


PostNL a seamless customer experience and secure access

A customer-friendly platform with Single Sign-On capabilities


Koninklijke Bibliotheek selects iWelcome as authentication service for the digital library

Koninklijke Bibliotheek (KB), the National Library of the Netherlands, brings people and information together. To that end, KB makes the Dutch library collection visible, sustainable […]


The Best Approach to Identity and Access Management

18th March 2016

“I forgot my password!” “Can you help me access this application from my laptop when I’m on the road?” “I just bought this new application […]


Radboud chose Identity Manager

 “Identity Manager differentiated itself from other solutions due to its completeness — it allowed a single product to tackle all of the issues we face, […]


The next generation of IAM solutions has arrived

For years, identity and access management (IAM) has carried the stigma of denial, restriction, limitation, and sometimes, failure. The processes and technologies required to enhance […]