SOFFID BLOG
What’s new at Soffid?
It’s time to stay up-to-date about identity!
Our goal is to provide practical security tools, solutions, and education to help make all applications safer. On this site you’ll find all of our thoughts, ideas, projects, and research.

Attending the Gartner Identity & Access Management Summit 2022
Year after year, identity is the most commonly exploited attack vector used by...

Keeping online payments safe
Making a payment is a transaction every consumer will do at some point. The...

Are your Security Risk Assessments Growing?
Security risk assessments are an important tool in your organization’s arsenal...
Latest News
Digital Signatures
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It's the...
What is digital trust?
Cybersecurity has become vastly more complicated in recent years. The days when antivirus software and a network firewall were enough to get the job...
Why PAM is so essential?
Remote working is here to stay, and the channel is pivotal in supporting organisations in their efforts to maintain the best protection against...
A convergent approach to enterprise security
Globalization, easy access to information, exponential growth of immigration and society diversity, worldwide political and cultural conflicts, all...
Soffid 3.3.X: An improved version of our platform
In today’s digital world, enterprise IT and security professionals are increasingly seeking identity and access management (IAM) services to provide...
Cybersecurity, a growing priority
Recently, there has been a staggering rise in cybersecurity threats. This is primarily due to the coronavirus pandemic. Increased geopolitical...

Attending the Gartner Identity & Access Management Summit 2022
Year after year, identity is the most commonly exploited attack vector used by...

Keeping online payments safe
Making a payment is a transaction every consumer will do at some point. The...

Are your Security Risk Assessments Growing?
Security risk assessments are an important tool in your organization’s arsenal...
Latest News
Effective Cyber Resilience
Cyber resilience refers to the ability to protect electronic data and systems from cyberattacks,...
New approaches and challenging at cybersecurity
Developing a fully integrated strategic approach to cyber risk is fundamental to manufacturing...
Digital Signatures
A digital signature is a mathematical technique used to validate the authenticity and integrity of...
What is digital trust?
Cybersecurity has become vastly more complicated in recent years. The days when antivirus software...
Get a Custom Demo
We’d love to hear from you. See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world.
Let’s discuss your project
Share your requirements and a representative will follow up to discuss how Soffid can help secure your organization.
Get a Custom Demo
We’d love to hear from you. See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world.
Let’s discuss your project
Share your requirements and a representative will follow up to discuss how Soffid can help secure your organization.
