Connected, federated, secured

What is Tiered Delegated Administration?

One of the unique features of Ubisecure Identity Server is the mechanism for delegating application role management to the external customers, business or private, of an organisation in a controlled fashion. It is called the tiered delegated administration model. This … Read More

Preparing for general data protection regulation

Preparing for General Data Protection Regulation (GDPR) – part IV

Guest blogger Richard Hancock continues his series on GDPR preparation.   Today is a very important day.  Exactly 1 year / 12 months / 52 weeks / 365 days, until enforcement of the biggest revolution in data protection, subject’s rights … Read More

Typical Customer Identity and Access Management Use Case – Part II

Last time I wrote you about our typical customer case from SSO (Single Sing-On) point of view and about the benefits of having your customer identities in one place. The joy of having one password and one user ID that … Read More

This is 100% Secure – Information Security Myths

This blog is a step away from our usual Identity and Access Management topics and talks about a few points that people should do, or know, to be better equipped in this modern world of 1s and 0s. In recent … Read More

IAM Academy Autumn 2017 – Registration now open!

Registration is now open for classroom-based IAM Academy training for our customers and partners. This is a great way to get up to speed or brush up your skills on topical identity management related topics and the Ubisecure product portfolio. … Read More

eIDAS as a business driver for online commerce in Europe?

One of the challenges business have in managing their digital transformation is the concern about security and regulatory repercussions of electronic signing of contract documents. From September 2018, the use of electronic identification (eID) and signatures will become a (much more usable) … Read More

IACA 2017

Identity Assurance in Electronic Transaction – presenting at the 40th IACA Annual Conference

I’m thrilled to be discussing Identity Assurance, at the 40th IACA Annual Conference in Halifax, Nova Scotia from May 21-25. In the first general session on the Tuesday – entitled CLEAR SAILING: IDENTITY ASSURANCE IN ELECTRONIC TRANSACTIONS, I will be … Read More

Preparing for general data protection regulation

Preparing for General Data Protection Regulation (GDPR) – part III

Guest blogger Richard Hancock continues his series on GDPR preparation.   In my second blog on GDPR we mentioned two of the major mitigating preventative measures provisioned for within the GDPR – pseudonymising and encryption.  Today, we’re going to look … Read More

Digital Identity

3 Basic Mistakes in Digitalisation

Digitalisation is one of those words you hear constantly. Gartner defines digitalisation as follows: “Digitalisation is the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to … Read More