Securing Access: The Power of Access Certification in IGA Webinar Summary

Maintaining up-to-date user access rights is a paramount security challenge. Changes in the organizational structure, the transfer of users to other departments, changes in security policies, and other transformational processes within a company require the reassessment of the existing access rights. A regular review of user access is a key element of an effective access Read more about Securing Access: The Power of Access Certification in IGA Webinar Summary[…]

Flexible Authentication Webinar Summary

Authentication methods are constantly evolving. Today, traditional authentication with a username and password is not enough. There are different authentication methods that can be employed. That’s why we introduced the new concept of flexible authentication in midPoint 4.1. Authentication methods in midPoint can now be configured in many different ways using various combinations of authentication Read more about Flexible Authentication Webinar Summary[…]

Evolveum and RSA Conference 2020

RSA Conference 2020 and the Human Element

Few weeks ago we attended RSA Conference, the biggest cyber security conference in the world. The conference took the whole week starting on Monday February 24th and ending up in the afternoon of February 28th with the great Penn & Teller show. It was exhausting but rich week during which we got a lot of Read more about RSA Conference 2020 and the Human Element[…]

Data Provenance and IDM solution midPoint

Plans for Data Provenance

Today is a Data Protection Day, which is a very symbolic day for midPoint. We are taking data protection and privacy very seriously. We believe that privacy in the cyberspace is necessary for the free society to flourish. Despite such belief, we acknowledge the implementation of privacy and data protection may not be easy. But we are not afraid of challanges. We are fully committed to implement privacy and data protection features in midPoint. […]