Petteri Ihalainen
Recent Posts
-
What is Biometric Authentication?
August 15, 2016What is Biometric Authentication? We look into the concept of authenticating using 'something that…
-
The Benefits of Mobile Connect
July 04, 2016In the second post of the Mobile Connect series we take a deeper look into Mobile Connect from the…
-
From a Cookie to a Customer
November 11, 2015Identity and Access Management (IAM) can help in the ecommerce conversion process. Using an Identity…
-
A Cure for the Healthcare Identity Crisis
September 30, 2015A recent article on cio.com stated that healthcare organizations are three times more likely to be a…
-
Identity Management and Cost Savings
September 02, 2015For companies trying to move from costly manual processes to automated processes, the challenge is…
-
Identity and Access Management and Your CRM
August 19, 2015When your company is creating its strategy around identity and access management, make sure that the…
-
Digital Identity in the Sharing Economy
August 05, 2015Verified, reliable and trustworthy digital identities are the key for the sharing economy.…
-
Confirm Your Transactions
July 29, 2015Granting access to the B2B portal based on password, or federated identity from the customer domain…
-
How to Ensure a Successful IAM Project
July 08, 2015Identity and access management (IAM) projects can be quite complex and there are many reasons why…
-
Internet of Things and IAM
July 02, 2015As the Internet of Things (IoT) continues to drive more devices connected to the Internet, more…
-
New GlobalSign IAM Solution Release
June 24, 2015With the latest release of our identity and access management (IAM) solution, we're extending our…
-
Layer Model for Identity
June 17, 2015When we access networked data, it travels through several layers from the physical cable all the way…
-
Benefits of Federation
June 10, 2015Federation is a technology term for transferring a user identity from one domain to another…
-
IAM and the War on Clicks
June 03, 2015A well-executed and thoughtfully integrated identity and access management (IAM) solution can help…
-
IAM for Business
May 19, 2015Too often in the IT security market, we paint dark clouds in the horizon, use scare tactics and…
-
OAuth-Much More Than Facebook
May 07, 2015The proliferation of mobile devices is increasingly driving the need for strong authentication as…
-
Keeping the Secrets of the Seven Kingdoms
April 29, 2015The airing of the first episode of Game of Thrones season 5 was a big event for millions of people…