The following is a high level capabilities matrix for OAuth2. The vendors chosen for comparison, are a selected few, that have well known capabilities within the access management space. For example, some are listed within the Gartner Magic Quadrant for Access Management – typically seen as the largest and most capable providers of access technology. […]
Okta recently released their 10K filing for the 2019 financial year with the Securities and Exchange Commission. The following contains references to that document unless otherwise stated. Introduction Okta is a cloud based identity and access management provider, who went public in April 2017. As per the filing, they describe themselves as: …the leading independent […]
Ping Identity recently filed their SEC 10K for the fiscal year ending December 31st 2019. The below figures and quotes are all taken from the March 2020 filing, unless otherwise stated. Ping is a leading digital identity provider, whose stated mission is to “secure the digital world through Intelligent Identity.” Ping Identity is pioneering Intelligent […]
The world’s most popular websites [1], according to the Alexa website are the following: Site Daily Time on Site (mins:secs) Daily Pageviews per Visitor Google.com 12.23 14.56 YouTube.com 12:19 6.96 Tmall.com 6:46 2.88 Qq.com 3:43 4.02 Baidu.com 7:18 4.40 Facebook.com 17:18 7.83 Sohu.com 3:44 4.61 Login.tmall.com 5:05 1.00 Taobao.com 4:23 3.53 360.cn 3:16 3.90 [1] […]
The W3C backed standard for passwordless authentication, commonly known as WebAuthn, has been worked on by experts from the likes of Microsoft, Google and Mozilla for several years. In early 2019 it was recommended as a standard and is being adopted by many organisations as a result. This article will take a deeper look at […]
6 Minute Read.Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook description would be something that articulated the “inefficient distribution of goods and services in a free market”. But how do we decide whether the distribution is […]
Schools out for summer?  Well not quite.  Unless you’re living in the east coast of Australia, it’s looking decidedly bleak weather wise for most of Europe and the American east coast.  But I digress.  Is it looking bleak for your digital identity driven projects?  What’s been a success, where are we heading and what should […]
A Google search for “zero trust” returns ~ 195Million results.  Pretty sure some are not necessarily related to access management and cyber security, but a few probably are.  Zero Trust was a term coined by analyst group Forrester back in 2010 and has gained popularity since Google started using the concept with their employee management […]
Welcome to a digital identity project in 2020! You’ll be expected to have a plan for post-quantum cryptography.  Your network will be littered with “zero trust” buzz words, that will make you suspect everyone, everything and every transaction.  Add to that, “machines” will be learning everything, from how you like your coffee, through to every […]
2016 is drawing to an end, the goose is getting fat, the lights and decorations are adorning many a fire place and other such cold weather cliches.  However, the attention must turn back to identity management and what the future may or may not hold. Digital identity or consumer based identity and access management (CIAM) […]