Prevent Data Breaches: Making Sure The Algorithms Work
An identity platform like ForgeRock is the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This is a very nice position to gather rich log identity data to use to prevent data breaches. In my previous blog, I discussed how we detect data breaches using identity logs.
Mon, 08/12/2019 - 14:00
Aug. 7, 2019
By James Billingham
The ForgeRock Identity and Access Management Platform can be deployed in many different cloud services like AWS, Google, Azure, and even in Alibaba Cloud very recently by a partner. Being able to support a cloud deployment model is one thing, but keeping up with the changes in the cloud at the pace they are happening is where ForgeRock excels.
Aug. 6, 2019
By Gerhard Zehethofer
On Tuesday, ForgeRock announced the availability of its IoT Edge Controller, which provides consumer and industrial organizations with the ability to deliver trusted identity at the device level.
Blockchain: A Distributed Ledger Technology (DLT)
My mother just called me, wondering why a week doesn't go by that she doesn’t read about yet another Fortune 100 company announcing some Blockchain initiative. She asked me "What is this chain thing, and why are some people so enamored with it?"
What is a DLT?
While I didn't (and still don't) have a clear answer for the latter, for the former I started by first trying to explain (and highlight the merits) of a system that has these “DLT" characteristics:
Mon, 08/05/2019 - 19:23
Replacing Legacy Systems with Identity-Enabled Microservices
According to a recent Forrester report, The Future Of Identity And Access Management, identity-enabled microservices are fast-replacing complex and monolithic legacy solutions. Why? Microservices and API-based solutions show faster time-to-value, provide flexibility for changing requirements, and support mobile and IoT technologies.
Wed, 07/31/2019 - 14:45
Microservices Enablers: DevOps and Identity
To create competitive advantage within today’s disruptive economy, organizations need to not only adapt to customer demands, but they also need the agility to turn on a dime in response to the ever-changing landscape of customer requirements and provide superior and engaging customer experiences --- whether it be online, in store, or across the entire omni-channel journey. In other words, within business, adaptability and agility are the most important attributes for long-term success.
Tue, 07/30/2019 - 14:45
Jul. 26, 2019
By Darryl Jones
Open Banking is a global movement. In some geographies it is driven by regulation; in others, it is driven by industry encouragement or organic business adoption. Beyond regulation, there is no doubt that the cost of screen scraping is significant, and secure Open APIs is a more cost effective, safe, and enabling solution. With Open Banking, the innovation possibilities for financial organizations and developers are limitless. Not only can Accounts and Payments APIs be made available as per the regulation, but other for-profit APIs can be opened.
Jul. 16, 2019
By Ashley Stevenson
Are you being asked to reduce your growing Identity & Access Management (IAM) costs? Are you being asked to support new business initiatives like Digital Transformation, Bring Your Own Device (BYOD), and other borderless workplace initiatives? Is your legacy IAM system becoming a bottleneck for regulatory and security compliance, or too fragile for the pace of changes needed by the business? It's time to modernize your legacy IAM.
Prevent Data Breaches: Identity Logs and Machine Learning
An identity platform like ForgeRock sits right in the heart of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. It turns out that this is a perfect position to gather rich log identity data to use to prevent data breaches.
Mon, 07/15/2019 - 15:25
Jun. 24, 2019
By Robert Vamosi
Former DHS Secretary Michael Chertoff Talks About Privacy and Access Management at Gartner’s US Security & Risk Summit
On Tuesday morning at the Gartner Security & Risk Management Summit in National Harbor, Maryland, former DHS Secretary Michael Chertoff sat in conversation with Gartner’s Distinguished VP Analyst Leigh McMullen. Although the bulk of the one hour guest keynote focused on terrorism, Chertoff did offer some insights around privacy and access management.