Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

Group Management with MidPoint Webinar Summary

The identity governance and administration world is not just about identities and their accounts. It is also about their access rights, e.g., group membership. But how can midPoint adopt the existing access rights, present them as roles, and start managing them? What if midPoint is not allowed to manage some groups at a given time Read more about Group Management with MidPoint Webinar Summary[…]

Role Mining in MidPoint Webinar Summary

On September 26, 2024, we held a webinar focused on the role mining feature in midPoint that is designed to help organizations optimize access control by revealing hidden business information. This webinar explored role mining as a solution to common challenges, such as over-permissioning, the lack of insight into access rights, and role explosion that Read more about Role Mining in MidPoint Webinar Summary[…]

Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]

AMI Praha: SAP SuccessFactors HR Webinar Summary

We organized a webinar within our MidPoint Integrations: Partner Series iniciative, led by AMI Praha‘s Chief Solution Architect, Martin Lízner, where you could explore Fortuna Entertainment Group’s shift from an on-premise HR system to an SAP SuccessFactors cloud solution thanks to midPoint. Martin explained how AMI Praha integrated this new HR system into their existing Read more about AMI Praha: SAP SuccessFactors HR Webinar Summary[…]

MidPoint Intermediate Training Teaser Webinar Summary

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since the beginning, the major task of midPoint customization has been configuring midPoint behavior. This includes the preparation of schema handling, mapping, object templates, and more. If you follow our First Steps Methodology, you can manage the configuration entirely in the GUI, but there are Read more about MidPoint Intermediate Training Teaser Webinar Summary[…]

NIS2 Directive and Identity Governance

The NIS2 Directive of the European Union aims to increase level of cybersecurity in crucial sectors of industry and government. The directive introduces cybersecurity requirements that are expected to be applied consistently across the EU. The directive touches on many areas of cybersecurity, including identity governance and administration. Directive (EU) 2022/2555 of the European Parliament Read more about NIS2 Directive and Identity Governance[…]

Celebrating Women in Engineering 2024 – MidPoint Edition

The representation of women in engineering has been gradually improving over the years, although it remains a male-dominated field. In 2023, women comprised 15.7% of the engineering and tech workforce in the UK, down from 16.5% in 2022.[1] Data more specific to software engineers tells us some staggering statistics: In Europe, 19% of people in Read more about Celebrating Women in Engineering 2024 – MidPoint Edition[…]

EU Cybersecurity Landscape

The European Union is quite busy producing cybersecurity regulations. Several cybersecurity-related acts have passed during the last few years, and even more are on the way. The EU looks like it really means to improve cybersecurity. However, an avalanche of new legislation can be quite confusing. Let’s take a closer look at the EU cybersecurity initiative. […]