Check out the first in our series on how the importance of identity is changing the priorities of CISOs.
Tags: Identity
Related Articles
Rate Limiting at the Edge with HAProxy By Matt Barrio
See how to use stick tables to implement a simple rate limiter. HAProxy provides robust functionality and extensibility through Lua.
How OneLogin is bridging cloud and on-premise directories By Natalia Wodecki
Some of our customers, prefer to keep their existing on-prem user stores and use OneLogin to simplify management of their user identities.
What is Single Sign-On? By Natalia Wodecki
Implementing Single Sign-On (SSO) helps companies become more productive. With SSO companies save time and money.