Administrator Credentials: High Impact Security Breach

When you think about enterprise data security, the first thing you picture is an outside intruder. It might be some kid in a dark basement hacking into your servers, or maybe a more sophisticated attack from a cyberspy contingent overseas. However, one of the greatest threats to your enterprise data security stance might be sitting…

How to configure SSO with Salesforce using IBM Cloud Identity Connect

This guide describes detailed steps for configuring SAML 2.0 federated single sign-on using predefined connector between IBM Cloud Identity and Salesforce. For this federation configuration, IBM Cloud Identity acts as Identity Provider (IDP). Salesforce acts as Service Provider (SP). Following are the high level steps for configuring SSO between IBM Cloud Identity and Salesforce: Configure…

IDaaS Vendors to Watch in 2017

Gartner analysts predict that by 2020, 40 percent of IAM purchases will use IDaaS delivery model, a two-fold increase from less than 20 percent today. Perhaps more important is that 40 percent of those IDaaS implications will entirely replace on-premises IAM implementations, according to Gartner. Future, is in the cloud. Here are the top IDaaS…