Uncategorized archivos - soffid.com
Soffid provides full Single Sign On experience and full identity governance features. All in an open source, efficient and powerful software product. Security and productivity is now affordable.
Single Sign on, Identity governance, IAM, Identity and access management, Open Source, free IAM, open source IAM
13
archive,category,category-uncategorized,category-13,ajax_fade,page_not_loaded,,qode_grid_1300,qode-child-theme-ver-1.0.0,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Uncategorized

Google Apps is one of the most popular service providers for business of any size, but the tools provided by Google to manage user accounts and groups don't give system administrators the flexibility and capabilities a specialized identity management product can offer.  With Soffid, you can...

With Soffid, you can manage four types of accounts: Unmanaged accounts. Theese accounts will be ignored by Soffid synchronization engine. Their primary goal is to allow a smooth transition without having to bother about some accounts until later. Single user accounts. Theese acounts belong to...

Password stress is a common problem on small and big copmanies. The advent of cloud applications has increased the number of user names and passwords that an average user has to manage. Soffid provides a complete single sign on mechanism, able to get rid authentication dialogs in a easy, efficient and secure fashion.

To secure mobile device access is an important challenge, due to potential security risks that a device lost represents. Soffid can reduce security risks while improving user experience using digital certificates. The advantages that a digital certificate represents are clear from technical and functional point of view.

Soffid can improve legacy system protection, by allowing complex password policies to be defined. Inside user and password domains screen, the administrators can define the password policy to apply to any system. Thus, a system set can be configured to share its passwords. This system set...

These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that old technologies pose risks as well, and those risks aren’t going away. In fact, as your legacy systems continue to get more out-of-date while the world around them continues to evolve, the risks may be increasing.These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that old technologies pose risks as well, and those risks aren’t going away. In fact, as your legacy systems continue to get more out-of-date while the world around them continues to evolve, the risks may be increasing.