Category: Security

Why Are Companies Transitioning To Password-Less Authentication?

“Are you just one weak password away from a devastating security breach?” Data security is intrinsic to software development, though it is often understated till the time it is compromised. Since the advent of computers, we equate data security with passwords. However, with the increase in cyber threats, the emergence of new technologies and meager…

NextGen IAM – Your Catalyst For Digital Transformation

New entrants in the market are taking a digital first strategy by embodying digital processes upfront. Quite a few of the new kids on the block have adopted a completely radical approach to solving an existing problem by going digital. This innovative approach has given these companies a significant edge. Uber, Ola are good examples....

Challenges With SAML Just In Time (JIT) Provisioning

If your organization uses cloud-based services, then it is quite likely that your IT team has already configured Single Sign On (SSO) for these cloud-based services. SSO ensures that you can use your enterprise account credentials for logging on to cloud-based services. SAML (Security Assertion Mark-up Language) is currently the gold standard for SSO. One...

Role Of IAM In Digital Journey

Today, the Identity and Access Management (IAM) landscape plays a crucial role in a business's digital journey. IAM influences the digital experience for the customers. How does IAM fit into this digital journey? To understand this, it is important to understand that IAM is more than just security and governance. IAM has been traditionally looked...

Test Automation Framework for AV Surveillance Application

Customer Customer provides a complete suite of events and video management solutions using cloud server. This server will enable the client devices (mobiles, web) to configure, control and view media from the enabled cloud camera. The server will host a web application, which functions as the intermediary for communication and authentication between the client and...

OTP Library

The authors for this blog are Abdul Waheed and Paresh Borkar. Many organizations today still struggle with providing strong authentication for their web-based applications. Most organizations continue to rely solely on passwords for user authentication, which tend to be weak (to be easy to memorize), shared across systems, etc. Though there have been strides towards...

The Power of Context-Aware Authentication

Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...

Moving Beyond Passwords towards OTP

Passwords are a necessary evil, and are everywhere. Many organizations still rely completely on passwords for authentication purposes. While most of us are well aware of the limitations of passwords, we rarely move beyond them. How many of us use Two Factor Authentication (2FA) provided by cloud service providers like Google for all the services we...