Cyber Security vs User Experience

Cyber security is often seen as the opposite of user experience. Good security means inferior user experience. In the digital world that we are part of, creating the best practical user experience is critical to businesses. According to a study … Read More

Customer IAM Fundamentals

Quite a few of our blogs have recently been about projects we are participating in, technology deep dives or GDPR. Time to take a step back and go to the basics and figure out which are the fundamental features and … Read More

The Danger of Relying on IAM When You Need CIAM

In a recent blog post Ed Sawma from Okta outlines how IAM and CIAM are the same, and not the same. Reading through the post you might get a warm and fuzzy feeling inside that says typical (Enterprise) IAM solutions … Read More

New Customer IAM Partner Program Launches Today

Today we announce the roll out of Ubisecure Partner 2020, our new partner program for System Integrators, VARs, Developers and Consultants active in the Customer IAM (CIAM) sphere.  Ubisecure Partner 2020 has been designed from the ground up and in … Read More

Business Case for Customer Identity and Access Management (CIAM)

A decade ago Identity and Access Management projects tended to spiral out of control both on deployment time and budget. These projects where Enterprise IAM were being deployed, aimed to increase internal efficiency, employee satisfaction (by simply reducing the number … Read More

IACA 40th Annual Conference – Unleashing the True Power of a Business Identity

Steve Roylance, Vice President of Identity Services, Ubisecure, recently participated in the 40th IACA Annual Conference in Halifax and proposed a model where an organisation managing vetted identity information, such as a business registry could become an Identity Provider (IdP). … Read More

Connected, federated, secured

What is Tiered Delegated Administration?

One of the unique features of Ubisecure Identity Server is the mechanism for delegating application role management to the external customers, business or private, of an organisation in a controlled fashion. It is called the tiered delegated administration model. This … Read More

Typical Customer Identity and Access Management Use Case – Part II

Last time I wrote you about our typical customer case from SSO (Single Sing-On) point of view and about the benefits of having your customer identities in one place. The joy of having one password and one user ID that … Read More

Digital Identity

3 Basic Mistakes in Digitalisation

Digitalisation is one of those words you hear constantly. Gartner defines digitalisation as follows: “Digitalisation is the use of digital technologies to change a business model and provide new revenue and value-producing opportunities; it is the process of moving to … Read More

Customer experience

Our typical Customer IAM use case

Does this sound familiar? Last time I wrote about my experiences when I started at Ubisecure. After that, I have spent my time learning what is it that we actually do. Now I would like to share it with you. Like … Read More