ProofID and PEGRight merge to create £18m ($23M) international IAM company

19th June 2017

ProofID Ltd, a Manchester-based provider of Identity Management (IDM) technology solutions and US-based PEGRight Inc, an Identity and Access Management (IAM) specialist have announced their merger.  The $5m transaction will immediately increase grou [...]

Read More

How to set up Okta LDAP integration for Microsoft AD LDS

13th June 2017

ProofID Technical Consultant, Theo Chimbga provides instructions on how to configure Lightweight Directory Access Protocol (LDAP) integration between Okta and an Active Directory Lightweight Directory Services (AD LDS) instance. AD LDS is Microsoft’ [...]

Read More

Configuring database audit logging on PingFederate with MySQL

8th May 2017

Paul Heaney, Technical Director at ProofID discusses how to configure database audit logging on PingFederate with MySQL. In an enterprise PingFederate deployment, it’s a good idea to configure the system to log to a central repository such as databa [...]

Read More

Speedy Single Sign-On to SalesForce using PingFederate

23rd March 2017

In this video, ProofID consultant Ben Andrews demonstrates how quickly single sign-on (SSO) to Salesforce can be implemented using PingFederate.  SSO provides a distinct advantage as users can access multiple resources using a single username and [...]

Read More

5 Reasons to Adopt Ping Identity as a Managed Service

19th January 2017

Here are our 5 Top Reasons to consider Ping Identity as a Managed Service (ProofID IDaaMS). Downtime of IAM technologies leads to user dissatisfaction and loss of revenue. ProofID IDaaMS provides industry leading resolution times to critical inciden [...]

Read More

ProofID Launches Ping Identity as a Managed Service

ProofID has launched Ping Identity as a Managed Service (ProofID IDaaMS) in order to support and develop existing Ping technology implementations. The need for this service has been driven by the mission critical nature of these platforms which has c [...]

Read More

5 B2B Questions for your Identity and Access Management (IAM) Provider

31st October 2016

When thinking about integrating customers, suppliers and other partners into your business through the use of technology, your approach to identity and access management (IAM) is a key consideration. Many supplier offerings in this space share a lot [...]

Read More

The Common Pitfalls of B2B Security

25th October 2016

As organisations extend their technology to partners to realise business benefit the importance of security cannot be overlooked. With much of the focus and energy flowing towards business requirements the issue of security and providing access are o [...]

Read More

Password Mismanagement is the Leading Access Control Problem

16th August 2016

With or without the help of a password hacking tool, it is far too easy for passwords to be compromised. Simple passwords (even Barack Obama admits to using them) can be hacked with a little trial and error, whilst even the more complicated password [...]

Read More

Security vs User Experience – A fine balance

12th August 2016

It is widely accepted that relying on passwords as the primary mechanism for authentication is no longer fit for purpose. With individuals interacting with so many online services it’s inevitable that the same password will be used in a variety of pl [...]

Read More
Contact us