It is important to understand the latest tactics used by adversaries to...
CATEGORIES
open source
Open Source. The value of ideas has increased
Today’s business leaders face enormous pressure from markets, competition, and...
Research: “Open-source options for Identity and Access Management”
Open-source components are available for core identity and access management...
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
The Benefits of Open Source IGA: A Key to Security and Flexibility
At Soffid IAM, we often get asked why we share our code base for free, especially when it comes to Identity Governance and Administration (IGA). Last week, a potential customer questioned why we would offer our intellectual property at no cost. It’s a reasonable...
The use of the cloud as a primary tool puts companies’ data at risk
It is important to understand the latest tactics used by adversaries to compromise cloud infrastructure. Cloud exploitation is on the rise, and it is essential to be aware of the threats that businesses are facing. Why are adversaries accelerating cloud exploitation?...
Open Source. The value of ideas has increased
Today’s business leaders face enormous pressure from markets, competition, and the current pandemic, which is radically changing the way we do business and engage with customers. Organizations need to adapt, imagine new revenue models, innovate as never before, and...
Research: “Open-source options for Identity and Access Management”
Open-source components are available for core identity and access management functions. IAM leaders can avoid proprietary software purchase costs; however, software maintenance and support contracts will likely be needed. In the last research of Gartner the theme...