Category: Security

IAM Challenges Of The Modern Enterprise

Nearly 94% of all enterprises have faced some form of an identity-related security breach within their ecosystem. Identity and Access Management (IAM) performs the core function of the gatekeeper for managing an organization’s access control requirements. However, IAM has a broader landscape to address in the modern enterprise of today. Enterprise digital transformation is scaling,...

Why Are Companies Transitioning To Password-Less Authentication?

“Are you just one weak password away from a devastating security breach?” Data security is intrinsic to software development, though it is often understated till the time it is compromised. Since the advent of computers, we equate data security with passwords. However, with the increase in cyber threats, the emergence of new technologies and meager…

NextGen IAM – Your Catalyst For Digital Transformation

New entrants in the market are taking a digital first strategy by embodying digital processes upfront. Quite a few of the new kids on the block have adopted a completely radical approach to solving an existing problem by going digital. This innovative approach has given these companies a significant edge. Uber, Ola are good examples....

Challenges With SAML Just In Time (JIT) Provisioning

If your organization uses cloud-based services, then it is quite likely that your IT team has already configured Single Sign On (SSO) for these cloud-based services. SSO ensures that you can use your enterprise account credentials for logging on to cloud-based services. SAML (Security Assertion Mark-up Language) is currently the gold standard for SSO. One...

Role Of IAM In Digital Journey

Today, the Identity and Access Management (IAM) landscape plays a crucial role in a business's digital journey. IAM influences the digital experience for the customers. How does IAM fit into this digital journey? To understand this, it is important to understand that IAM is more than just security and governance. IAM has been traditionally looked...

Test Automation Framework for AV Surveillance Application

Customer Customer provides a complete suite of events and video management solutions using cloud server. This server will enable the client devices (mobiles, web) to configure, control and view media from the enabled cloud camera. The server will host a web application, which functions as the intermediary for communication and authentication between the client and...

OTP Library

The authors for this blog are Abdul Waheed and Paresh Borkar. Many organizations today still struggle with providing strong authentication for their web-based applications. Most organizations continue to rely solely on passwords for user authentication, which tend to be weak (to be easy to memorize), shared across systems, etc. Though there have been strides towards...

The Power of Context-Aware Authentication

Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...