The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.
While Okta and NS1 support SAML Authentication, Provisioning and de-provisioning users still requires manual work. We hate manual work, so here’s a way to automate the entire process, end-to-end, using Okta Workflows. Still unfamiliar with Workflows? Start here. Setting the Scene On NS1’s portal, Create an API Key for Okta Workflows. 2. On Okta Workflows […]
At times when interest rates are close to zero and VC money flows into startups and tech companies, we see a spike in the recruitment pace of talented knowledge workers. The competition for software engineers, developers, DevOps, SREs, and security engineers is fierce. Therefore, companies put lots of effort into optimizing their employee experience, also […]
Credential phishing is the practice of stealing user ID/email address and password combinations by masquerading as a reputable or known entity. Attackers then use the victim’s credentials to carry out attacks on a secondary target, such as breaching into enterprise networks. GlobalDots, in collaboration with Identity Governance market leader Okta, gathered 4 common misconceptions which lead […]
Two thirds of employees now work remotely, raising new security & productivity issues. GlobalDots implements IAM solutions to protect all web, cloud, and on-premise activity, while creating a frictionless user experience, regardless of application, device, or location. This solution brief includes top features, capabilities, and benefits. Fill out the form to get your copy.
The public cloud has been a great business enabler, but has also created a number of user access relatedblind spots and brought with it serious security challenges. As the number and type of SaaS apps and IaaSservices continues to increase exponentially, user privileges, resource permission sets, app capabilities, andrisks have become increasingly difficult to manage.Authorization, […]
Passwordless authentication is the key to simplifying and streamlining the process of connecting employees to all systems company-wide.
Business expansion usually leads to an increase in users and employees accessing various applications and platforms from many devices. With an IAM framework in place, companies can control user access to critical information within their organizations.
Passwords Still Dominant Authentication Method, Top Cause of Data Breaches
In this article, GlobalDots’ solutions architect, Steven Puddephatt, offers his insight on future IT security challenges in 2020 and the decade ahead.