4 Easy steps to cloud access management Posted on 02 November 2017 by Lorna Ayoun-Berdugo in Enterprise Security How do you implement a cloud access management solution? Cloud apps in the enterprise have become mainstream, but moving to cloud-based applications can be challenging.… Deloitte data breach demonstrates why MFA and user access controls… Posted on 06 October 2017 by Danna Bethlehem in Enterprise Security With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we… Who’s afraid of cloud app management? Fear not, solutions are… Posted on 21 June 2017 by Mor Ahuvia in Enterprise Security Managing cloud access can be challenging. Explore how access management solutions have emerged to address cloud-based app management issues and to ensure secure, compliant and… Security and the mythical ‘business user’ Posted on 18 December 2013 by Gemalto in Enterprise Security We often talk about ‘business applications’ or ‘business software’ as if they belonged to a separate universe of applications. This makes sense – some applications… Gemalto Launches CloudEntr, a new single sign-on solution Posted on 05 December 2013 by Francois Lasnier in Enterprise Security Our latest innovation, CloudEntr (a web-based single-sign-on solution), is finally coming to life, and I am very excited to see the materialization of an effort started… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.