Prevent Data Breaches: Making Sure The Algorithms Work

An identity platform like ForgeRock is the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This is a very nice position to gather rich log identity data to use to prevent data breaches. In my previous blog, I discussed how we detect data breaches using identity logs.

Read More »

Is Your IAM Vendor Keeping up with the Cloud?

The ForgeRock Identity and Access Management  Platform can be deployed in many different cloud services like AWSGoogle, Azure, and even in Alibaba Cloud very recently by a partner. Being able to support a cloud deployment model is one thing, but keeping up with the changes in the cloud at the pace they are happening is where ForgeRock excels.

Read More »

IoT Edge Controller: Trusted Identity at the Device Level

On Tuesday, ForgeRock announced  the availability of its IoT Edge Controller, which provides consumer and industrial organizations with the ability to deliver trusted identity at the device level.  

Read More »

Blockchain: A Distributed Ledger Technology (DLT)

My mother just called me, wondering why a week doesn't go by that she doesn’t read about yet another Fortune 100 company announcing some Blockchain initiative. She asked me "What is this chain thing, and why are some people so enamored with it?"

What is a DLT?

While I didn't (and still don't) have a clear answer for the latter, for the former I started by first trying to explain (and highlight the merits) of a system that has these “DLT" characteristics:

Read More »

Replacing Legacy Systems with Identity-Enabled Microservices

According to a recent Forrester report, The Future Of Identity And Access Management, identity-enabled microservices are fast-replacing complex and monolithic legacy solutions. Why? Microservices and API-based solutions show faster time-to-value, provide flexibility for changing requirements, and support mobile and IoT technologies. 

Read More »

Microservices Enablers: DevOps and Identity

To create competitive advantage within today’s disruptive economy, organizations need to not only adapt to customer demands, but they also need the agility to turn on a dime in response to the ever-changing landscape of customer requirements and provide superior and engaging customer experiences --- whether it be online, in store, or across the entire omni-channel journey. In other words, within business, adaptability and agility are the most important attributes for long-term success.

Read More »

Beyond Regulation: Open Banking Accelerators

Open Banking is a global movement. In some geographies it is driven by regulation; in others, it is driven by industry encouragement or organic business adoption. Beyond regulation, there is no doubt that the cost of screen scraping is significant, and secure Open APIs is a more cost effective, safe, and enabling solution. With Open Banking, the innovation possibilities for financial organizations and developers are limitless. Not only can Accounts and Payments APIs be made available as per the regulation, but other for-profit APIs can be opened.

Read More »

7 Simple Steps to Modernize Your Legacy IAM

Are you being asked to reduce your growing Identity & Access Management (IAM) costs? Are you being asked to support new business initiatives like Digital Transformation, Bring Your Own Device (BYOD), and other borderless workplace initiatives? Is your legacy IAM system becoming a bottleneck for regulatory and security compliance, or too fragile for the pace of changes needed by the business? It's time to modernize your legacy IAM.

Read More »

Prevent Data Breaches: Identity Logs and Machine Learning

An identity platform like ForgeRock sits right in the heart of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. It turns out that this is a perfect position to gather rich log identity data to use to prevent data breaches.

Read More »

Privacy and Access Management: Insights from Michael Chertoff

Former DHS Secretary Michael Chertoff Talks About Privacy and Access Management at Gartner’s US Security & Risk Summit

On Tuesday morning at the Gartner Security & Risk Management Summit in National Harbor, Maryland, former DHS Secretary Michael Chertoff sat in conversation with Gartner’s Distinguished VP Analyst Leigh McMullen.  Although the bulk of the one hour guest keynote focused on terrorism, Chertoff did offer some insights around privacy and access management.

Read More »

Upcoming Events:

How to Create a Modern IAM Framework for Healthcare

Webinar

Healthcare providers are using digital technology to access, secure, and share patient information in order to efficiently deliver care. Does your healthcare organization need assistance in securing and maintaining a single patient identity?

Modernising Identity & Consent Management

Manchester, UK

Join us for another Identity Tech Talk "On Tour" event!

This time we will be in Manchester discussing the importance of not applying a one size fits all approach to authentication and the role played by digital identity in accelerating Open Banking / PSD2 compliance.
 

Identity Access Management Europe

Utrecht, Netherlands

Join Whitehall Media’s 7th Identity Access Management Europe conference, hosted in Utrecht for the first time, to discuss key insights and trends across digital identity, the newest techniques to ensure successful IAM implementation, and strategies to create secure and resilient identity infrastructures.