M365 is a true catalyst for collaborative work, having to respond to the increase in internal threats that result. The importance of the M365 suite in business The Microsoft 365 software suite offers a critical set of collaborative services for…
Tag: identity
The use of "guest" identities to facilitate collaboration externally The need for collaboration externally entails risks for companies Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must…
Nowadays, access management and security concept of APIs are inherent to federation protocols OAuth2 and OpenID Connect. Both protocols natively cover a great deal of use cases, but regularly evolve and come with complements to address more innovative subjects. In…
Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations' activities. For those who have not yet taken the plunge (mainly ETIs and the public sector),…
Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC…
As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major…
La Loi de Programmation Militaire (LPM) 2014-2019 et les arrêtés sectoriels associés, ainsi que la déclinaison française de la directive européenne NIS, consacrent une place importante à la gestion des identités et des accès sur les infrastructures critiques. En effet,…
Identity and IoT, what stakes? Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or…
Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to…
TOWARD INCREASINGLY DECENTRALIZED iss… In recent years, companies have faced an expansion in the scope of Identity and Access Management (IAM) activities. They no longer concentrate solely on user provisioning and authentication; focus has shifted toward both account review and…