Configuring database audit logging on PingFederate with MySQL

8th May 2017

Paul Heaney, Technical Director at ProofID discusses how to configure database audit logging on PingFederate with MySQL. In an enterprise PingFederate deployment, it’s a good idea to configure the system to log to a central repository such as databa [...]

Read More

Speedy Single Sign-On to SalesForce using PingFederate

23rd March 2017

In this video, ProofID consultant Ben Andrews demonstrates how quickly single sign-on (SSO) to Salesforce can be implemented using PingFederate.  SSO provides a distinct advantage as users can access multiple resources using a single username and [...]

Read More

5 Reasons to Adopt Ping Identity as a Managed Service

19th January 2017

Here are our 5 Top Reasons to consider Ping Identity as a Managed Service (ProofID IDaaMS). Downtime of IAM technologies leads to user dissatisfaction and loss of revenue. ProofID IDaaMS provides industry leading resolution times to critical inciden [...]

Read More

ProofID Launches Ping Identity as a Managed Service

ProofID has launched Ping Identity as a Managed Service (ProofID IDaaMS) in order to support and develop existing Ping technology implementations. The need for this service has been driven by the mission critical nature of these platforms which has c [...]

Read More

5 B2B Questions for your Identity and Access Management (IAM) Provider

31st October 2016

When thinking about integrating customers, suppliers and other partners into your business through the use of technology, your approach to identity and access management (IAM) is a key consideration. Many supplier offerings in this space share a lot [...]

Read More

The Common Pitfalls of B2B Security

25th October 2016

As organisations extend their technology to partners to realise business benefit the importance of security cannot be overlooked. With much of the focus and energy flowing towards business requirements the issue of security and providing access are o [...]

Read More

Password Mismanagement is the Leading Access Control Problem

16th August 2016

With or without the help of a password hacking tool, it is far too easy for passwords to be compromised. Simple passwords (even Barack Obama admits to using them) can be hacked with a little trial and error, whilst even the more complicated password [...]

Read More

Security vs User Experience – A fine balance

12th August 2016

It is widely accepted that relying on passwords as the primary mechanism for authentication is no longer fit for purpose. With individuals interacting with so many online services it’s inevitable that the same password will be used in a variety of pl [...]

Read More

Is Your PCI DSS Provider Aware of Upcoming Changes in v3.2?

11th August 2016

If you are a merchant who has outsourced PCI DSS responsibilities to a third party, it may be prudent to ascertain how the provider is planning to meet the requirements coming into action by the end of 31 January 2018. Whilst this date may seem reass [...]

Read More

Why financial institutions need to be more agile

8th August 2016

Thinking about fintech for a moment, there are already some major success stories with companies such as TransferWise and Funding Circle. These success stories bring validity to the plethora of innovative businesses that are bringing different busine [...]

Read More
Contact us