midPoint and GDPR

midPoint and GDPR

General data protection regulation (GDPR) is all about good management of identity data. And that is exactly what identity management (IDM) technologies do. Also, it is unlikely that GDPR compliance can be effectively implemented without any support from the technology. And that’s where IDM systems come in again. Overall, IDM technologies are almost perfect fit for GDPR compliance. But how exactly can identity management system such as our very own midPoint help with GDPR? […]

GDPR – The Evolution, not the revolution

GDPR – The Evolution, not the revolution

Many years have passed since the actual data protecting regime had been set. The technology is making huge steps and virtual environment is full of new threats. The personal data are of a great value in such environment. Therefore, the data protection deserves a proper attention. And GDPR should provide more safety. To understand any Read more about GDPR – The Evolution, not the revolution[…]

GDPR and Identity Management

GDPR and Identity Management

General Data Protection Regulation: a lot of people are already familiar with that. Much more people will have to get familiar with it quite soon. GDPR may be seen as a trouble and there is definitely a lot of work to be done for GDPR compliance. But, honestly, such regulation was bound to happen sooner Read more about GDPR and Identity Management[…]

Evolveum GDPR shield

GDPR – Ready or not, here I come

G-D-P-R, these four letters might be causing you a headache, if you run a conscious business. GDPR brings some difficult obligations on scene and it is about time to start with preparations. If you care about the data protection, you surely dealt with it already or at least considered the processes improving privacy in your organization. Read more about GDPR – Ready or not, here I come[…]

MidPoint and semi-Manual Resources

Semi-Manual Resources

Recently released MidPoint 3.6 “Comenius” brings a lot of new intersting features. But there is one feature that is almost invisible and it could be easily missed. That would be an enormous shame because this particular feature is quite unique and it is very interesting indeed. We like to call it “semi-manual resources”. But let’s start at the beginning … […]

MidPoint 3.6 “Comenius”

MidPoint 3.6 “Comenius” is finally released. The Comenius release is huge in all aspects. It is a feature-packed release. It has so many features that Comenius is most likely the richest release in the entire midPoint history. But the number of features is not the only thing that matters. MidPoint 3.6 brings features with a significant effect on almost any identity management and governance deployment. […]

Evolveum open source pledge

Our names are Igor Farinič and Radovan Semančík. Although you might have noticed our names you are probably not aware that we are the founders of Evolveum. Evolveum is not based on venture capital investments and therefore the control of the company is firmly in our hands. And now we would like to very clearly express our commitment to the open source approach. Evolveum was, is and always will be an open source company. […]

RBAC and ABAC

Role-Based Access Control (RBAC) has been around for decades. It is both loved and hated. Over the years many newer access control models tried to improve on RBAC. Many of these developments focus on making the model more flexible. Attribute-Based Access Control (ABAC) is perhaps the most prominent model in this category. Quite recently there Read more about RBAC and ABAC[…]

MidPoint IDM Customization and Deployment 1 training report

Last week there was a five-day MidPoint IDM Customization and Deployment 1 training in Bratislava. As always, discussing real-life challenges was inspiring for the students as well as for Evolveum and we hope it helped to transfer the knowledge in both ways – to learn midPoint, and to make it even better. Here’s a few pictures capturing Read more about MidPoint IDM Customization and Deployment 1 training report[…]

How to protect your privacy online

By 2020, more than 30.7 billion devices will be connected to the Internet. On one hand, that gives people access to information all over the world as well as an opportunity to electronize the processes and let the workflow be more efficient. On the other hand, there is a big risk of identity theft, fraud, Read more about How to protect your privacy online[…]