An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]
An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
I recently ran another of my highly scientific polls on cyber security technology opinions last week that asked the question as to whether passwordless authentication still classified as multi factor authentication (MFA). I dropped the polls into LinkedIn and Twitter here. It generated some interesting responses. Before we dive into that, let me set the […]
Our founder Simon Moffatt will be running a consumer identity and access management masterclass workshop at this month’s Chartered Institute of Information Security live event. The two day cyber security extravaganza will feature some of the world’s leading information security experts – with headliners including Bruce Schneier (Security Veteran and Crypto Expert) Phil Venables (Google […]
A few weeks ago I ran a slightly provocative and not very scientific poll on LinkedIn asking which was the more important: authentication or authorization? Clearly in the grand scheme of things that is a pretty pointless exercise, but the rationale was to really identify some thought processes and reactions. It provided some interesting responses. […]
Let us start with a few definitions just to get started. Authentication is focused upon asserting the properties of an entity and confirming a level of assurance. The typical process of signing in or logging in. Clearly authentication for people is quite a well known process, as we perform the task every day – sometimes […]

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe's largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.