Six key reasons to use strong authentication in a professional mobile environment
General Data Protection Regulation (GDPR), Network and Information Security Directive (NIS), Second European Payment Services Directive...

General Data Protection Regulation (GDPR), Network and Information Security Directive (NIS), Second European Payment Services Directive...
In the first half of 2017 alone, the volume of cyber-attacks doubled compared to the same period just one year earlier. There is no...
Identity and Access Management (IAM) can no doubt bring many benefits to an organisation; increased security, greater usability and...
How to protect business data without imposing onerous authentication processes on employees is a challenge that most businesses have or...
Organisations are continually moving business applications and services to the cloud. Alongside the growth of remote workers within an...
By: Barry O’Donohoe, Co-Founder, RAiDiAM Consulting A report from Identity and Access Management specialists Ilex International and...
IAM is historically driven by compliance and user provisioning. It had a very limited scope of coverage in terms of applications, a low...
Launching a Single Sign-On (SSO) project in an organisation is often linked to the user’s dissatisfaction with the current IT system,...
Nowadays, barely a day goes by without an organisation getting hacked. In this age of ‘big data’, cyber criminals can compromise almost...
Ilex International has worked with mobile security research and consultancy specialist, Goode Intelligence, to develop a white paper...