The National Institute of Standards and Technology describes ABAC this way: ABAC is a logical access control model that is distinguishable because it controls access to objects by evaluating rules against the attributes of the entities (subject and object) actions and the environment relevant to a request. Attributes may be considered characteristics of anything that
Is Single Sign-On (SSO) and Identity and Access Management (IAM) the same? How do password resets differ when using SSO? What is best: a specialised SSO solution combined with a specialised IAM solution, or a “one-size-fits-all” solution? SSO vs IAM SSO and IAM are two different ingredients for managing identities and system access in general.
For the past few years, data breaches have been increasing massively—rising in both frequency and scope. 2011 used to be known as the “Year of the Data Breach”. Then came 2013 when data breaches overshadowed those of previous years so much that Symantec took to calling it the “Year of the Mega Data Breach”. Last
Lots of articles on user-friendliness highlight how Apple revolutionized user interface design with the iPhone, and now the design of almost everything in the world of software has improved. So for every conceivable task, you now have your choice of simple, sleek, easy-to-use apps to help you do it better, and maybe even make it
5 months ago we entered into a partnership with a Swedish firm known as Implema. The people at Implema have established themselves as SAP experts in Sweden and have executed many projects all over the world. With more than 7 locations throughout Sweden, Implema is known for their quality of service and customer-first attitude. When
If you look up the word service in a dictionary, you will find that it can be used as a noun, adjective, or verb. However, no matter the grammatical form, the message is the same; it’s about doing something for someone else. Most agree that service is an integral part of doing business, no matter the
IDM365 is, as of March 2, 2015, entering the US together with EDGE Business Advisory in San Francisco. IDM365 will be taking advantage of the US market’s focus on security and risk management. In recent years, the number of security breaches that have occurred in big business environments has been staggering. Companies have lost huge
For Identity and Access Management specialists like us, the case is the same, and it is becoming a struggle to communicate our message clearly and in a way that can be compared to what’s already out there. So, for the next few minutes, I will chart a clearer path through the forest of terms related
The first version of IDM365 was initiated by some serious challenges faced by some of our clients. At that time we were mainly supporting these clients as security consultants. Questions that kept surfacing were about the users. The challenge was more or less divided into three main categories: One type of challenge was how to
ITMC has recently rebranded itself, complete with a new logo and website. Why the changes? Because ITMC had grown and improved in so many ways, and had become a leader in our industry, but our branding did not send that message. It was bland and generic, and made us look just like every other IT company.