Authentication as a Gatekeeper

Your authentication solution is your gatekeeper. It will enable your customers to conduct business with you while keeping others out. There are a lot of different gatekeepers out there in the market. If your organisation has an online service for … Read More

Featured Post

New Customer IAM Partner Program Launches Today

Today we announce the roll out of Ubisecure Partner 2020, our new partner program for System Integrators, VARs, Developers and Consultants active in the Customer IAM (CIAM) sphere.  Ubisecure Partner 2020 has been designed from the ground up and in … Read More

Featured Post

Business Case for Customer Identity and Access Management (CIAM)

A decade ago Identity and Access Management projects tended to spiral out of control both on deployment time and budget. These projects where Enterprise IAM were being deployed, aimed to increase internal efficiency, employee satisfaction (by simply reducing the number … Read More

Featured Post

IACA 40th Annual Conference – Unleashing the True Power of a Business Identity

Steve Roylance, Vice President of Identity Services, Ubisecure, recently participated in the 40th IACA Annual Conference in Halifax and proposed a model where an organisation managing vetted identity information, such as a business registry could become an Identity Provider (IdP). … Read More

Featured Post
Connected, federated, secured

What is Tiered Delegated Administration?

One of the unique features of Ubisecure Identity Server is the mechanism for delegating application role management to the external customers, business or private, of an organisation in a controlled fashion. It is called the tiered delegated administration model. This … Read More

Featured Post
Preparing for GDPR

Preparing for General Data Protection Regulation (GDPR) – part IV

Guest blogger Richard Hancock continues his series on GDPR preparation.   Today is a very important day.  Exactly 1 year / 12 months / 52 weeks / 365 days, until enforcement of the biggest revolution in data protection, subject’s rights … Read More

Featured Post

Typical Customer Identity and Access Management Use Case – Part II

Last time I wrote you about our typical customer case from SSO (Single Sing-On) point of view and about the benefits of having your customer identities in one place. The joy of having one password and one user ID that … Read More

Featured Post

This is 100% Secure – Information Security Myths

This blog is a step away from our usual Identity and Access Management topics and talks about a few points that people should do, or know, to be better equipped in this modern world of 1s and 0s. In recent … Read More

Featured Post

eIDAS as a business driver for online commerce in Europe?

One of the challenges business have in managing their digital transformation is the concern about security and regulatory repercussions of electronic signing of contract documents. From September 2018, the use of electronic identification (eID) and signatures will become a (much more usable) … Read More

Featured Post
IACA 2017

Identity Assurance in Electronic Transaction – presenting at the 40th IACA Annual Conference

I’m thrilled to be discussing Identity Assurance, at the 40th IACA Annual Conference in Halifax, Nova Scotia from May 21-25. In the first general session on the Tuesday – entitled CLEAR SAILING: IDENTITY ASSURANCE IN ELECTRONIC TRANSACTIONS, I will be … Read More

Featured Post