ForgeRock Blog

Blog posts detailing access management security trends and the latest digital identity management insights

Prevent Data Breaches: Making Sure The Algorithms Work

An identity platform like ForgeRock is the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This is a very nice position to gather rich log identity data to use to prevent data breaches. In my previous blog, I discussed how we detect data breaches using identity logs.

Nach Mishra Mon, 08/12/2019 - 14:00

Is Your IAM Vendor Keeping up with the Cloud?

The ForgeRock Identity and Access Management  Platform can be deployed in many different cloud services like AWSGoogle, Azure, and even in Alibaba Cloud very recently by a partner. Being able to support a cloud deployment model is one thing, but keeping up with the changes in the cloud at the pace they are happening is where ForgeRock excels.

Read More

IoT Edge Controller: Trusted Identity at the Device Level

On Tuesday, ForgeRock announced  the availability of its IoT Edge Controller, which provides consumer and industrial organizations with the ability to deliver trusted identity at the device level.  

Read More

Blockchain: A Distributed Ledger Technology (DLT)

My mother just called me, wondering why a week doesn't go by that she doesn’t read about yet another Fortune 100 company announcing some Blockchain initiative. She asked me "What is this chain thing, and why are some people so enamored with it?"

What is a DLT?

While I didn't (and still don't) have a clear answer for the latter, for the former I started by first trying to explain (and highlight the merits) of a system that has these “DLT" characteristics:

rjones Mon, 08/05/2019 - 19:23
Replacing Legacy Systems with Identity-Enabled Microservices

According to a recent Forrester report, The Future Of Identity And Access Management, identity-enabled microservices are fast-replacing complex and monolithic legacy solutions. Why? Microservices and API-based solutions show faster time-to-value, provide flexibility for changing requirements, and support mobile and IoT technologies. 

DougNB Wed, 07/31/2019 - 14:45
Microservices Enablers: DevOps and Identity

To create competitive advantage within today’s disruptive economy, organizations need to not only adapt to customer demands, but they also need the agility to turn on a dime in response to the ever-changing landscape of customer requirements and provide superior and engaging customer experiences --- whether it be online, in store, or across the entire omni-channel journey. In other words, within business, adaptability and agility are the most important attributes for long-term success.

Alex Laurie Tue, 07/30/2019 - 14:45

Beyond Regulation: Open Banking Accelerators

Open Banking is a global movement. In some geographies it is driven by regulation; in others, it is driven by industry encouragement or organic business adoption. Beyond regulation, there is no doubt that the cost of screen scraping is significant, and secure Open APIs is a more cost effective, safe, and enabling solution. With Open Banking, the innovation possibilities for financial organizations and developers are limitless. Not only can Accounts and Payments APIs be made available as per the regulation, but other for-profit APIs can be opened.

Read More

7 Simple Steps to Modernize Your Legacy IAM

Are you being asked to reduce your growing Identity & Access Management (IAM) costs? Are you being asked to support new business initiatives like Digital Transformation, Bring Your Own Device (BYOD), and other borderless workplace initiatives? Is your legacy IAM system becoming a bottleneck for regulatory and security compliance, or too fragile for the pace of changes needed by the business? It's time to modernize your legacy IAM.

Read More

Prevent Data Breaches: Identity Logs and Machine Learning

An identity platform like ForgeRock sits right in the heart of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. It turns out that this is a perfect position to gather rich log identity data to use to prevent data breaches.

Nach Mishra Mon, 07/15/2019 - 15:25

Privacy and Access Management: Insights from Michael Chertoff

Former DHS Secretary Michael Chertoff Talks About Privacy and Access Management at Gartner’s US Security & Risk Summit

On Tuesday morning at the Gartner Security & Risk Management Summit in National Harbor, Maryland, former DHS Secretary Michael Chertoff sat in conversation with Gartner’s Distinguished VP Analyst Leigh McMullen.  Although the bulk of the one hour guest keynote focused on terrorism, Chertoff did offer some insights around privacy and access management.

Read More

There are no upcoming events.