News
Indeed Identity joined IDC Summit in Turkey as a silver sponsor
Posted by anna.vlasenko on 28 September 2022 11:52 AM

Indeed Identity participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. The event took place on 22nd of September aiming to tackle the cybersecurity strategies that are being implemented in the MEA region and gathered many IT security professionals. 

Industry experts joined this event to exhibit modern approaches and technologies that can help companies to empower their IT infrastructure. Many great ideas were voiced and, as one of the speakers, Burak Ozan


Read Complete article

Cyber Security World Asia returned this year and was held on 12th – 13th October 2022 at Marina Bay Sands, Singapore.

The event gathered cyber security professionals and business leaders with experts, solutions and services to help accelerate digital transformation plans. This year Indeed Identity was amongst those experts and participated in this leading technology event as a bronze sponsor. For two days we were presenting authentication and comprehensive access management, PAM and


Read Complete article

Implementing the Principle of Least Privilege is easier than you think
Posted by anna.vlasenko on 21 September 2022 01:18 PM

IT security resilience of an organization highly depends on how effectively privileged users work with its IT infrastructure. As the saying goes – with great power comes great responsibility. The question is – do you rely on the privileged users to be in control of your IT infrastructure security and stability or do you take matters in your own hands?

Forrester Research estimates at least 80% of security breaches involve privileged credentials. Such incidents as those which happened in


Read Complete article

Germany’s largest insurer for private households and one of the 10 largest German insurance groups. The company is actively using digital certificates which play a vital role in the internal processes of the company. As the product they were using had announced the end of life, they decided it was time to migrate. 

The main requirements were: ability to handle all the PKI management tasks which were performed by the previous solution, ability to work with various smart cards (even


Read Complete article

Indeed Identity joined Mindshare 2022 as a pre-conference sponsor
Posted by anna.vlasenko on 24 May 2022 02:29 PM

After two years of Corona break Mindshare is back on and this year it was more exciting than ever. Over 450 international guests, many exciting presentations, discussion panels, workshops, and exhibition booths. 

Mindshare is a security expert forum where Cryptovision gathers its clients and partners. It took place on May 19th and 20th in Gelsenkirchen and once again was a great success. Indeed Identity participated as a pre-conference dinner sponsor and was represented by our


Read Complete article

5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM

Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation.

There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone


Read Complete article

Indeed Identity hosted Business Breakfast together with CreaPlus and OSI.si
Posted by anna.vlasenko on 19 April 2022 03:21 PM

On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and OSI.si. During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management.

Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has


Read Complete article

Privileged management use cases now extend across entire organizations, with users requiring task-based and workflow access to data, services, and applications held on legacy systems and multi-cloud-based infrastructures. And, of course, admins still need to perform those traditional privileged tasks. This change explains why PAM software, in general, has developed in the last few years. Both new and traditional vendors have responded well to demands for more advanced PAM capabilities suitable


Read Complete article

Slovenian card payment processor* as part of migration from Microsoft CLM / FIM (EOL) initiated the procedure of purchasing a Card Management System. After the implementation of the Indeed Certificate Manager we decided to ask them to share their experience and decision-making process.

Why did you consider implementing a CMS?

We tend to have an organized environment and have previous experience with MS CMS FIM. Clever, efficient, and secure use of digital certificates is extremely important


Read Complete article

Hackers have always had itchy fingers to damage small to large-scale businesses, and with the COVID-19 pandemic still happening, the situation is getting worse. While the possibility to work from the comfort of your own home is praised by employees, it creates cybersecurity challenges for enterprises.

Some of the most common threats that organizations can become victims of are ransomware, phishing, and data breaches. The consequences of encountering such dangers can be detrimental.


Read Complete article