Securing your Salesforce application with IBM Cloud Identity

Software applications play an important role in our lives. Whether it is in the home or workplace, we use them for communicating with people, staying up-to-date with the things happening in the world, keeping entertained, doing work and much more. Salesforce is a cloud computing service as a software (SaaS) company that specializes in customer…

Work Securely with Your Partners and Contractors

In today’s modern era, it is very common for enterprises to work with contractors and business partners. This brings a variety of users from outside the network. These users are known broadly as the extended enterprise. Though the extended enterprise can be critical in enabling organizations to scale their business, it also brings massive risks…

Administrator Credentials: High Impact Security Breach

When you think about enterprise data security, the first thing you picture is an outside intruder. It might be some kid in a dark basement hacking into your servers, or maybe a more sophisticated attack from a cyberspy contingent overseas. However, one of the greatest threats to your enterprise data security stance might be sitting…

How to configure SSO with Salesforce using IBM Cloud Identity Connect

This guide describes detailed steps for configuring SAML 2.0 federated single sign-on using predefined connector between IBM Cloud Identity and Salesforce. For this federation configuration, IBM Cloud Identity acts as Identity Provider (IDP). Salesforce acts as Service Provider (SP). Following are the high level steps for configuring SSO between IBM Cloud Identity and Salesforce: Configure…

IDaaS Vendors to Watch in 2017

Gartner analysts predict that by 2020, 40 percent of IAM purchases will use IDaaS delivery model, a two-fold increase from less than 20 percent today. Perhaps more important is that 40 percent of those IDaaS implications will entirely replace on-premises IAM implementations, according to Gartner. Future, is in the cloud. Here are the top IDaaS…