Blog - soffid.com
Soffid provides full Single Sign On experience and full identity governance features. All in an open source, efficient and powerful software product. Security and productivity is now affordable.
Single Sign on, Identity governance, IAM, Identity and access management, Open Source, free IAM, open source IAM
571
paged,page-template,page-template-blog-large-image,page-template-blog-large-image-php,page,page-id-571,paged-6,page-paged-6,ajax_fade,page_not_loaded,,qode_grid_1300,qode-child-theme-ver-1.0.0,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Blog

New software releases, updates and general news in the security space get updated in our blog.

 

Despite the freewheeling autononmy implied by the "bring your own device" movement, companies that embrace the consumerization of IT still have policies in place to govern the management and security of those devices.Despite the freewheeling autononmy implied by the "bring your own device" movement, companies that embrace the consumerization of IT still have policies in place to govern the management and security of those devices.

Barceló Hotels is deploying Soffid IAM & Soffid ESSO to enable single sign on access to its corporate applications, using either smartphones, tablets or desktop PCs. With Soffid ESSO, Barceló boosts their employees productivity and, at the same time, reduces the effort needed to support them,...

The term "role" stands for the function played by someone or something. In an enterprise context, a "role" is the set of permissions that a user needs to do its job. A well-designed role should map to a category or responsibility (for example, room clerk, hiring manager or archivist) and be named accordingly.

A U.S.-based global energy company employee with privileged user access was enticed by a foreign company to steal source code and other intellectual property from his employer. As a result of his theft, the company lost three quarters of its revenue, half of its workforce, and more than $1 billion in market value.

Bad news for all businesses, big and small. Cybersecurity is going to get a lot more complicated in 2014. Global nonprofit IT association ISACA believes IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity,...

We are pleased to announce our new partnership with install4j. What is it? A powerful multi-platform Java installer builder that generates native installers and application launchers for Java applications. Now Soffid IAM will work with it for the best of the results....

In the modern world of Internet connectivity, cloud computing, online banking, social networking, personal privacy and information security is essentially dependent upon password protection. Passwords are the crucial barrier that safeguards the personal information contained in the perhaps dozens of accounts that we interact with every day from theft and exploitation.

We have been working very hard the last few months to have available by the end of the year a number of significant improvements for the efficiency of our tool. Surely you notice the difference. Recertification process, rules and authoritative identity sources, XAMCL Addon, Replica Addon, Lopd Addon...