Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

thumbnail
How to Migrate From Gigya to Transmit Security

What is Gigya? Before being acquired by SAP in 2017, Gigya was a software company providing access and user...

thumbnail
How to Improve Account Recovery With Identity Verification

Identity verification has become increasingly common for consumer applications. From onboarding new banking customers to account recovery, identity proofing is one of the...

thumbnail
KuppingerCole Analysts Name Transmit Security An ‘Overall Leader’ in 3 Leadership Compass Reports

It’s a great honor when your company is recognized by trusted analysts, especially in a ranking report. So being named an ‘Overall Leader’...

thumbnail
Fraud by Popular Demand: Why Hacking Is So Easy

An appropriate analogy for the modern fraudster is a “kid in a candy store.” They’re surrounded by tools and targets with minimal threat...

thumbnail
Why Today’s Risk and Fraud Call for Modern CIAM

Looking back on my career in Customer Identity and Access Management (CIAM), I’ve seen a lot of change, especially over the past few...

thumbnail
Webinar: How Modern CIAM Defeats Complex ATOs

The reality of our online world is that fraudsters remain ahead of the game year after year. More and more businesses, across all...

thumbnail
Passkeys: Why They Matter and How to Use Them

An Introduction to Passkeys: Why They Matter and How to Use Them The cybersecurity world is buzzing with the...

thumbnail
Why PayPal is the next trusted brand adopting passkeys for secure customer authentication

An important announcement came out this Monday from PayPal. Starting immediately PayPal customers can get rid of passwords and use their on-device authentication...

thumbnail
CIAM or IAM?
Why You Need Purpose-Built CIAM to Meet the Needs of Customers

Yes, it’s an inconvenient truth: IAM and CIAM are distinctly different. Identity and access management (IAM) built for the...

1 2 3 4 14