Skip to content

Industry News

May 23

The CIO's Business Case For IAM

As the CIO, you must see the big picture when it comes to implementing technology in your organization. It is not good enough to look at how a technology addresses a single issue; the CIO must evaluate how a technology will both positively and negatively impact the entire company.

Read more
May 22

Case Study: Lieberman Research Worldwide

“LRW needed to integrate applications not included by many self-service SSO providers. Additionally, they did not have the necessary resources, expertise, or experience to implement this complex setup on their own.”

Read more
May 22

The CFO's Business Case For IAM

As the CFO, you are faced with the challenge of justifying technology purchases based on some combination of necessity, functionality, cost savings, benefits, and the overall ROI.

Read more
May 22

Securing Identity In K-12 Education

Authen2cate solves for challenges like large user bases, too many passwords, many mobile devices and increasing security costs with our K-12 solutions.

Read more
May 20

Single Sign-On

authen2cate provides a secure, scalable, and highly available IAM (Identity and Access Management) platform that allows any organization to quickly and securely implement SSO, 2-Factor Authentication, and Automated Provisioning.

Read more
May 19

Multi-Factor Authentication

Multi-Factor Authentication enables your users to secure their logins and transactions via text, email, smartphone application, or phone calls.

Read more
May 19

IAM for Any Industry: Health Care

In addition to the standard security and efficiency concerns that any organization faces with their internal network and IT processes and procedures, those within the medical field face heightened scrutiny due to the stringent regulations imposed on patient record access through HIPAA.

Read more
May 19

a2c Mobile Overview

a2c Mobile is the most secure way to do 2-Factor Authentication, and also the most cost-effective. By leveraging your employees’ devices (BYOD), you can secure access to your applications for far less than traditional methods.

Read more
May 18

Case Study: The Royal Marsden

a2c’s seamless completion of these challenging and time-consuming tasks allows The Royal Marsden’s dedicated IT staff to focus on other aspects of CMC.

Read more
May 18

Cloud Security 101

As cloud computing continues to grow, enterprises are relying more and more on outside providers of Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) for the applications they provide, and they are also allowing cloud providers to take over hosting both company data and on-premises applications.

Read more
May 16

Directory Services

authen2cate provides a number of directory-related services to meet our clients’ needs. We can act as the primary directory in the cloud for all your enabled applications or leverage your internal directory (LDAP or AD) as the primary source for user identities.

Read more
April 24

IAM for Any Industry: Education

The education field has several unique challenges when it comes to identity and access management (IAM) for the many applications their students and faculty use every day. But there are several ways in which different IAM technologies and methods can solve these challenges and make a more secure and convenient system!

Read more