article thumbnail

Enterprise-managed IAM: An SRE team case study

IBM Big Data Hub

Enterprise-managed identity and access management (IAM) enables cloud administrators to centrally configure access and security settings for the entire organization. ” The case study in this blog post shows how to easily and securely implement and manage a site reliability engineering (SRE) team’s access across an enterprise. .”

Cloud 71
article thumbnail

IBM Cloud solution tutorials: 2023 in review

IBM Big Data Hub

This year, IBM Cloud introduced projects and deployable architectures. A deployable architecture is a cloud automation for deploying a common architectural pattern that combines one or more cloud resources that are designed for easy deployment, scalability and modularity. Yet another security feature is a trusted profile.

Cloud 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enhancing customer experience: Streamlining orders with custom email notifications in IBM Cloud

IBM Big Data Hub

The answer to this predicament came in the form of the Custom Email Destination feature within IBM Cloud Event Notifications. By implementing the Custom Email Destination feature in IBM Cloud Event Notifications, the business transformed the way its customers stayed informed about new shipments. Click on Add > API Source.

article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

Researchers from Broadcom Symantec’s Threat Hunter team discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials that allowed access to private cloud services. “Over three-quarters (77%) of the apps contained valid AWS access tokens allowing access to private AWS cloud services.”

Cloud 95
article thumbnail

Redcentric Partners with Thales to Provide Scalable, Flexible Remote Access

Thales Cloud Protection & Licensing

Here are four key benefits to our business from partnering with Thales to deliver cloud-based access management and authentication via SafeNet Trusted Access. Scalable Authentication. Flexible Billing Model. Redcentric’s remote access service had a stable and consistent user base for 15 years. Full Range of Functionalities.

Access 71
article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Medical sensors are now better protected and trusted using established PKI standards to ensure proper authentication to other devices, provide end-to-end encryption, and then derive keys to decrypt data when it arrives at a verified location. To learn more, read this case study. Both Thales and nTropy.io

article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

The informative booth sessions include Jason Keenaghan , Director of IAM Product Management, on ‘Self-Sovereign Identity: Gateway to Privacy-First User Experience’, a joint session with Microsoft and Sarah Lefavrais , Manager, IAM Product Marketing, on the ‘Executive Order 14028 x Phishing Resistant Authentication = True Zero Trust’.