Resources
The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.
While ransomware, securing the cloud, and sprawling IoT vulnerabilities are keeping our CISO’s up at night, credential phishing is a consistent threat, plaguing their employees. Credential Phishing is the practice of stealing user ID/email address and password combinations, by masquerading as a reputable or known entity or person in email, instant message, or another communication […]
75% of the IT work related to the employee lifecycle can be automated. For 56% of the organizations, this is the #1-priority workflow automation to implement. In the infographic below you’ll explore: Key benefits of workflow automation Impact in numbers Case study highlights [download full case study here]
Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]
The booming cost of account takeover (ATO) attacks, from $4BN in 2020 to $16BN in 2021, makes passwordless authentication a truly pressing need for all businesses. Most current “passwordless” technologies still contain shared secrets and friction – deeming them irrelevant to the world’s most prominent workforce and buying power: Gen Y and Gen Z. Biometric […]
Which IT Nuisance Would You Automate First? Employee onboarding is one of the heaviest, most complex operations on a company’s IT. This is especially true in fast-growing companies that may see multiple onboardings per day. And, of course, the wider a company’s software tools array, the more accounts to create and permissions to manage. In […]
GlobalDots keeps enriching its IAM (Identity & Access Management) innovation offering, and its Passwordless Authentication range in particular, with the latest addition of highly-valued unicorn Transmit Security. Only this June, Transmit Security announced a $543 million Series A – the largest series A funding round in cybersecurity history, according to Crunchbase. Transmit Security has developed an appless […]
Most growing companies turn to IAM solutions for compliance purposes. What a waste. Today’s IAM capabilities go way beyond MFA & SSO: Implemented right, IAM can automate all employee-related IT processes, from account provisioning and deprovisioning to permission management. Join us and step into the world of: Automated workforce growth Increased employee & IT productivity […]
If you use Okta without any additional Active or LDAP Directory and want to use the existing user and groups from Okta in Akamai’s EAA, this article becomes handy to you. Especially if you use Okta as an Identity Provider (IDP) for your EAA applications. Instructions We have to parts here: Part One: Okta Configuration […]
Dror Arie, senior solution engineer at GlobalDots, is a pioneer in employee onboarding automation using IT workflows. In his Nasdaq guest article, he answers some key questions on one of the most crucial, yet overlooked, elements of employer branding: The employee onboarding experience. Why is onboarding overlooked in the employee lifecycle? Employers believe that their […]
HR professionals usually agree that proper employee onboarding is a 90-day process. Stats mentioning 7 days are therefore responded to with horror, or at least great concern. But, a great deal of employee onboarding – namely the IT part of it – can actually be automated. Imagine account provisioning by role and team rolling out […]
Passwords are obsolete. Memorizing long and complicated passwords has been holding back businesses for over 50 years, while cyberattacks are evolving every day. ¹ In fact, Google has registered over 2 million phishing sites as of January 2021. The figure is up from 1.7 million in January 2020, a 27% increase year on year. ² […]
IT and Security never played well together: Unscalable and overworked, they believe their interests to be conflicting. But in reality, both struggle to keep up with the demands of the business for speed and growth. Today, new technologies empower both functions with automations that help the organization move faster and augment scalability and security alike. […]
Identity & Access Management (IAM) is perhaps the most basic fundamental of any up-to-date security stack. In cloud-centric environments, which are distributed by nature, this is twice as true: Remote access from poorly-secured networks and a quickly-growing attack surface, rich with insider threats, both need to be restrained. IAM is therefore the first and foremost […]