Omada Blog

IGA Skills Checklist: How to Ensure a Successful IGA Deployment

IGA Skills Checklist: How to Ensure a Successful IGA Deployment

Identity governance and administration solutions, like many other enterprise-scale software deployments, requires a large variety of skills to achieve a successful implementation. 

By Stuart Beattie, Product Marketing Director | August 2018

Read more
Tech Insight: Why Reconciliation Is Essential in Access Governance

Tech Insight: Why Reconciliation Is Essential in Access Governance

Automated processes for the comparison and alignment of actual access data in IT systems with the desired permissions, also known as reconciliation, is an essential aspect of identity management and access governance.

By Dr. Martin Kuhlmann, Senior Solution Architect | August 2018

Read more
Megatrends and Identity Governance and Administration

Megatrends and Identity Governance and Administration

Analysis shows that technology will help prevent future issues associated with greater population density, natural resource shortages, and climate change. Without cybersecurity protection, system attacks will result in physical disruption and stealing of sensitive information.

By Stuart Beattie, Product Marketing Director | August 2018

Read more
How Secure are the Third Parties you Deal With?

How Secure are the Third Parties you Deal With?

Recent reports have shown that some outsourcing companies may not be protecting shared data as well as they should be.  Organizations should be more vigilant in ensuring that their business partners have data control procedures in place that are at least as stringent as their own to protect sensitive and confidential information.

By Stuart Beattie, Product Marketing Director | July 2018

Read more
Why Data Control Is the New Black

Why Data Control Is the New Black

Being in control of your data and having solid data handling processes in place have become a license to operate for organizations in the GDPR era. Data control has therefore also become a vital competitive factor, meaning companies without adequate cybersecurity are running out of organizations to do business with.

By Stuart Beattie, Product Marketing Director | July 2018

Read more
Do Giant GDPR Fines Apply to Data Breaches that Occurred Before May 25?

Do Giant GDPR Fines Apply to Data Breaches that Occurred Before May 25?

A European Commission official recently stated that data breaches that happened before 25th May, but kept undisclosed, would also be liable for GDPR fines, citing among others the fact that the deadline has been public for well over a year.

By Morten Boel Sigurdsson, CEO | June 2018

Read more
11 Steps to Prevent Insider Threats Using Identity and Access Management

11 Steps to Prevent Insider Threats Using Identity and Access Management

Many organizations are still neglecting the insider threat, despite this threat source being recognized as one of the root causes of data beaches. Read our tips for preventing insider threats and keeping your organization secure. 

By Stuart Beattie, Product Marketing Director | June 2018

Read more
Is Coca Cola’s Recent Breach Notification GDPR Compliant?

Is Coca Cola’s Recent Breach Notification GDPR Compliant?

The newly disclosed data breach by a former employee at the Coca Cola Company highlights an interesting angle on companies’ obligation to notify in connection with GDPR.

By Morten Boel Sigurdsson, CEO | June 2018
 

Read more
GDPR Minus Zero – Now the Real Work Begins

GDPR Minus Zero – Now the Real Work Begins

It is finally here. That’s right. We have been waiting for what seems like years for today to come and here it is. So, will today be like January 1 2000? Will we all collectively breathe a sigh of relief and get on with our lives? Move on? Nothing to see here? No. We won’t.

By Stuart Beattie, Product Marketing Director | May 2018

Read more
Why Data Protection Has Global Awareness

Why Data Protection Has Global Awareness

May 2018: The EU’s legislation for how organizations process the privacy data of EU citizens globally has led to a new global awareness about the need for tighter control, more security, and heightened compliance. Good data handling practices are crucial for organizations and the hype surrounding the GDPR should be seen as a positive, providing added business benefits in the process.  

By Stuart Beattie, Product Marketing Director | May 2018

Read more
Role-Based Access Control: What Is It and Why Do You Need It?

Role-Based Access Control: What Is It and Why Do You Need It?

Who has access to which systems in the organization, why, and how do you optimize the process for access control?

By Kenneth Fenger Jeppesen, Sales | March 2018
 

Read more
Five Ways to Reduce the Risk of a Data Breach

Five Ways to Reduce the Risk of a Data Breach

Data breaches are on the rise and with the introduction of the GDPR later this year, now’s the time to take note. Data breaches are not just bad for your reputation, they’ll soon be really bad for business, too, as the GDPR introduces fines of up to 4% of a company’s annual turnover or Euro 20 million, whichever is higher.

By Stuart Beattie, Product Marketing Director | February 2018

Read more
Most Will Not Be Ready for GDPR and Other Predictions for 2018

Most Will Not Be Ready for GDPR and Other Predictions for 2018

Cybersecurity is becoming more important than ever, as organizations worldwide are becoming increasingly digital and the number of hacks likewise just keeps increasing. Protecting your organization from cyber criminals – both internal and external to the organization – has never been more important.

By Stuart Beattie, Product Marketing Director | January 2018

Read more
Why Protection from the Insider Threat Matters

Why Protection from the Insider Threat Matters

In the age of cybercrime, most expect the largest danger to be external, but in reality, the insider threat retains its position as the one to watch. But while many organizations are well aware, and guarded against, external cybersecurity attacks, many lack protection from insider attacks.

By Stuart Beattie, Product Marketing Director | October 2017

Read more
The Integration Accelerator

The Integration Accelerator

How can identity and access management speed up the M&A process? When companies have to collaborate, that today means integrating the IT systems as quickly as possible and giving access to each other’s IT infrastructure and resources in general, be it IT systems or email groups, so as to enable communication between the two entities.

By Christian Stendevad, EVP | September 2017

Read more
Right to Privacy

Right to Privacy

Respect citizens right to privacy and give patients the power to decide who should have access to their privacy data.

By Morten Boel Sigurdsson, CEO | July 2017

Read more
8 General Misunderstandings about the EU GDPR

8 General Misunderstandings about the EU GDPR

In our dialogue with various organizations, we experience a great deal of misunderstandings in terms of what actions to take and how to initiate them. Therefore, we have gathered the most common misunderstandings about the new regulation.

By Morten Boel Sigurdsson, CEO | ​April 2017

Read more
EU GDPR Regulation Puts Your Business at Risk

EU GDPR Regulation Puts Your Business at Risk

One of the most frequently mentioned innovative features of the EU GDPR is that companies that compromise personal data can be fined up to four per cent of their annual global turnover. For these companies, this means that they can be subject to fines of an astronomic magnitude.

By Morten Boel Sigurdsson CEO | February 2017

Read more
Is Your Data Covered by the EU GDPR

Is Your Data Covered by the EU GDPR

When the EU General Data Protection Regulation (GDPR) becomes effective, the definition of “privacy data” will be widened substantially. The core of the EU GDPR is the concept of “personally identifiable data.” This should be interpreted very broadly as “data, which can identify a specific person.”

By Morten Boel Sigurdsson, CEO | March 2017 

Read more
Save Big Bucks on Software License Spends and Audits

Save Big Bucks on Software License Spends and Audits

Ensuring compliance and improving IT security are not the only benefits for organizations that adhere to the information security standards and regulations pertaining to access and identity control outlined in e.g. ISO27002, and in the EU GDPR.

By Santeri Kangas, CTO | October 2016

Read more
Stolen Credentials are a Core Attack Tool in the APT Anatomy

Stolen Credentials are a Core Attack Tool in the APT Anatomy

Hackers exploit user credentials in advanced persistent threat attacks, to gain foothold and move around in the organization.

By Santeri Kangas, CTO | September 2016

Read more

By using or further navigating this website, you agree to Omada's use of cookies. Click here to see our cookie policy.

Read Privacy Policy
Close