Profile cover photo
Profile photo
ILEX International
7 followers -
Éditeur spécialisé dans la gestion des identités et des accès (IAM).
Éditeur spécialisé dans la gestion des identités et des accès (IAM).

7 followers
About
Posts

Post has attachment
Five Key Access Management Considerations for 2018
In the first half of 2017 alone, the volume of cyber-attacks doubled compared to the same period just one year earlier. There is no doubt that the security threat to businesses is growing; cyber crime is rarely out of the news. With upcoming legislation, su...
Add a comment...

Post has attachment
How to overcome the common misconceptions around Identity and Access Management
Identity and Access Management (IAM) can no doubt bring many benefits to an organisation; increased security, greater usability and better flexibility across devices. However, IAM is not a magical solution that can solve all organisational issues. Unfortuna...
Add a comment...

Post has attachment
Securing your data in the cloud
Organisations are continually moving business applications and services to the cloud. Alongside the growth of remote workers within an organisation, securing and controlling access to cloud-based infrastructure and services has become increasingly challengi...
Add a comment...

Post has attachment
Open Banking initiative: What does this mean for the UK banking sector?
By: Barry O’Donohoe, Co-Founder, RAiDiAM Consulting A report from Identity and Access Management specialists Ilex International and RAiDiAM Consulting looks at the upcoming Open Banking legislation and the impact on UK banking organisations. The Open Bankin...
Add a comment...

Post has attachment
Oauth2 vs OpenId Connect
Thomas Poignant Chef de projet web Aujourd’hui, la fédération d’identités est un sujet essentiel en matière d’authentification pour toute organisation offrant de multiples services applicatifs. Parmi les nombreux protocoles de fédération disponibles, les pl...
Add a comment...

Post has attachment
Time to re-engineer Identity and Access Management
IAM is historically driven by compliance and user provisioning. It had a very limited scope of coverage in terms of applications, a low return on investment and provided very restricted controls and views of access. As more business applications and service...
Add a comment...

Post has attachment
Single Sign-On (SSO): How to differentiate the good from the bad when it comes to user experience and security
Steve Mullan UK Operations Manager Launching a Single Sign-On (SSO) project in an organisation is often linked to the user’s dissatisfaction with the current IT system, and the need to remember countless logins and passwords to access everyday applications....
Add a comment...

Post has attachment
Quand la confidentialité des échanges sert aussi les terroristes…
Par Frédéric Lefebvre Ingénieur Avant-vente Aujourd’hui, de nombreux médias cherchent à savoir comment communiquent les terroristes, et quels sont les moyens qu’ils mettent en œuvre pour faire transiter des informations sans éveiller les soupçons des autori...
Add a comment...

Post has attachment
FranceConnect, ou comment réconcilier les citoyens avec l’administration ?
Par Frédéric Lefebvre Ingénieur Avant-vent Jusqu’à très récemment, chacun de ces sites nécessitait la création d’un compte, et donc de gérer autant d’accès différents, avec pour chacun un identifiant et un mot de passe, qui bien souvent n’était pas le même ...
Add a comment...

Post has attachment
Mega breaches: What’s behind the headlines?
Nowadays, barely a day goes by without an organisation getting hacked. In this age of ‘big data’, cyber criminals can compromise almost any type of personal information. As technology continues to evolve, so do the number of routes of entry for criminals to...
Add a comment...
Wait while more posts are being loaded