Single Sign On in the Eyes of a Hacker Posted on 17 May 2018 by Jason Hart in Enterprise Security By: Jason Hart, CTO, Gemalto Enterprise & CyberSecurity Querying an unprotected database is one of my favorite ways to get a crowd’s attention, moving… Before You Choose Microsoft – 5 Access Management Considerations Posted on 16 April 2018 by Mor Ahuvia in Enterprise Security Learn the 5 key factors to consider when shopping for an access management solution. Choosing a solution is not an easy decision and addressing your… 4 Easy steps to cloud access management Posted on 02 November 2017 by Lorna Ayoun-Berdugo in Enterprise Security How do you implement a cloud access management solution? Cloud apps in the enterprise have become mainstream, but moving to cloud-based applications can be challenging.… Cloud Security: CloudEntr, Now Secures Logins and Files in a… Posted on 30 July 2014 by Gemalto in Enterprise Security Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has… CloudEntr Brings Big Business Identity and Access Management to the… Posted on 22 July 2014 by Gemalto in Enterprise Security Over at CloudEntr, we love to be loved by our customers (spoiler: we love them back), so we were especially excited to receive a little… Who should you trust more: Social log-in services or your… Posted on 02 July 2014 by Jean-Francois Ouillet in Mobile Social log-in services can be excellent time-saving tools and are a very convenient way to avoid the tedious process of online registration, filling in numerous… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories EnterpriseEnterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 08/05/18 @ 09:05 Dora How do I go about informing the FCA that I wish to invoke my 'right to be erased' or 'my right to be forgotten'?05/05/18 @ 01:05 Aol Support What can DDL learn from mobile payment adoption? in this post, the writer clearly discusses all things related to the topic. they mentioned the technique how to learn the technology in mobile, I want to know more about this topic from this website.30/04/18 @ 21:04 Anna Great read, and an important one as eSIMs become more available.