sso

Okta investigates possible data breach

Okta investigates possible data breach

May relate to third-party customer support engineer targeted in January.
Raphael Satter Mar 23 2022 7:08AM Security
Monash Uni infosec staff find gaping security hole in Palo Alto Networks gear

Monash Uni infosec staff find gaping security hole in Palo Alto Networks gear

Authentication bypass could be targeted by foreign adversaries.
Juha Saarinen Jun 30 2020 9:40AM Security
Identity manager OneLogin hacked, user data accessed

Identity manager OneLogin hacked, user data accessed

Customers required to reset credentials.
Juha Saarinen Jun 2 2017 6:45AM Security
LogMeIn acquires Meldium for $16m

LogMeIn acquires Meldium for $16m

Adds cloud SSO to IT management portfolio.
Penny Wolf Sep 5 2014 11:01AM Security
Review: SSO Express Standard Edition

Review: SSO Express Standard Edition

The Evidian product suite was one of the most complete identity management suites that we tested. As with most complete identity management products that cover provisioning, password self reset, workflow automation and distributed management, it is a complex product to install and configure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 7 2007 6:00AM Security
Review: WebConnect SSO

Review: WebConnect SSO

WebConnect SSO provides SSO access to mainframes (or, to put it another way, multiple mainframe applications) via a web browser interface.

Julian Ashbourn Feb 18 2005 12:00AM Security
Review: Passlogix v-GO SSO

Review: Passlogix v-GO SSO

The Passlogix single sign-on product is particularly versatile and caters for a broad range of potential applications. You can use it in a simple set-up for accessing your Windows and web applications, or, if you really want to put it to work, you can configure it for a variety of client/server, mainframe, database and even dial-up networking and VPN applications.

Julian Ashbourn Feb 18 2005 12:00AM Security
Review: Aladdin eToken SSO

Review: Aladdin eToken SSO

Aladdin's eToken SSO solution is based on the use of USB tokens upon which information is stored, including user data, application profiles and, if you wish, other certificates. This makes for a particularly intuitive operation as, once everything is set up, you just plug in your token and enter your password once. And when you have finished, simply remove the token.

Julian Ashbourn Feb 11 2005 12:00AM Security

Log In

  |  Forgot your password?