Securing your Salesforce application with IBM Cloud Identity

Software applications play an important role in our lives. Whether it is in the home or workplace, we use them for communicating with people, staying up-to-date with the things happening in the world, keeping entertained, doing work and much more. Salesforce is a cloud computing service as a software (SaaS) company that specializes in customer…

Work Securely with Your Partners and Contractors

In today’s modern era, it is very common for enterprises to work with contractors and business partners. This brings a variety of users from outside the network. These users are known broadly as the extended enterprise. Though the extended enterprise can be critical in enabling organizations to scale their business, it also brings massive risks…

What is Cloud Access Security Broker (CASB)

A Cloud Access Security Broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure. CASBs work by ensuring that network traffic between on-premises devices…

Administrator Credentials: High Impact Security Breach

When you think about enterprise data security, the first thing you picture is an outside intruder. It might be some kid in a dark basement hacking into your servers, or maybe a more sophisticated attack from a cyberspy contingent overseas. However, one of the greatest threats to your enterprise data security stance might be sitting…

What is DevOps

There are many definitions of the word “DevOps.” Is it a movement? A new process or technology? A job title? Or just a way of thinking? DevOps is a combination of software development and operations—and as its name suggests, it’s a melding of these two disciplines in order to emphasize communication, collaboration, and cohesion between…

How to configure SSO with Salesforce using IBM Cloud Identity Connect

This guide describes detailed steps for configuring SAML 2.0 federated single sign-on using predefined connector between IBM Cloud Identity and Salesforce. For this federation configuration, IBM Cloud Identity acts as Identity Provider (IDP). Salesforce acts as Service Provider (SP). Following are the high level steps for configuring SSO between IBM Cloud Identity and Salesforce: Configure…

IDaaS Vendors to Watch in 2017

Gartner analysts predict that by 2020, 40 percent of IAM purchases will use IDaaS delivery model, a two-fold increase from less than 20 percent today. Perhaps more important is that 40 percent of those IDaaS implications will entirely replace on-premises IAM implementations, according to Gartner. Future, is in the cloud. Here are the top IDaaS…

What is Hybrid Cloud?

As the name indicates, it is the functional combination of both public and private clouds. A public cloud like Microsoft Azure leverages the shared chunks of networking infrastructure, computing and its storage which are rented on a specific time basis for the customers. A private cloud comes with the same components but will be restricted…