CATEGORIES

Home

Enhancing Security for Remote Workers: Best Practices to Follow

In today's work landscape, remote work is on the rise, requiring organizations to adapt security measures. We want to emphasize the importance of implementing best practices to ensure the security of remote workers. The Role of VPNs in Remote Work Security Remote...

Why a User Access Control Policy is crucial for your organization

Organisations spend a lot of time and effort protecting their networks from external attacks. However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2012 Trust, Security...

Soffid IAM and the Gamification of Identity Governance process

Recently we have participated together with our partner IXTEL, in a really interesting webinar about Identity Governance. From Soffid IAM, our CTO Mr Gabriel Buades explained how the Access Certification mitigates access risks, and reduces review-times as well as...

Release 2.8.2 includes Session Recording and Keystrokes

New Soffid version is available for the end users at http://www.soffid.com/download/ New features: Session Recording and Keystrokes for Privileged users. – Improved NL translation – Mail password is now automatically encrypted on first use – Fixed wrong textbox look...
What is Authentication?

What is Authentication?

Authentication is basically the problem of taking a real world person who’s sitting in front of a computer and working at who they are, in other words, working at, which particular piece of...

read more
Release 2.8.2 includes Session Recording and Keystrokes

Release 2.8.2 includes Session Recording and Keystrokes

New Soffid version is available for the end users at http://www.soffid.com/download/ New features: Session Recording and Keystrokes for Privileged users. – Improved NL translation – Mail password is now automatically encrypted on first use – Fixed wrong textbox look...