News

In France and abroad, Ilex International participates in numerous events dedicated to IAM or markets in which it is present.

IDM Identity Management

IDM – Identity Management 2017 21st June 2017, London

Join Ilex International for IDM – Identity Management, the UK’s leading event for risk driven business-centric IAM luminaries, practitioners and end-users from across government and large enterprise organisations. Read more
Rivington Information Security: Information Security Consultancy and Managed Security services

Securing the Cloud

Best practices for securing data in the cloud As business applications and services continue to move to the cloud, and the number of remote workers rises, securing and controlling access to cloud-based services has become increasingly challenging. Once these cloud-based infrastructures and services are no longer secured, making sure added controls are in place alongside established policies is crucial to reducing the risk exposure. Read more
ROOMn Les rencontres d'affaires Mobilité et Digital

Ilex International at ROOMn 2017 7th - 9th March 2017, Monaco

Ilex International will attend the 5th edition of ROOMn. This unique and innovative event has become the strategic meeting dedicated to mobile and digital technologies. Its purpose is to shed a new light on the challenges and new corporate trends in the digital age.  Read more
RAiDiAM - Trusted Identity Services

Open Banking & PSD2: An Inflection Point for Digital Identity...

The UK’s Competition and Market Authority’s (CMA) latest attempt to increase competition and consumer choice among banking service providers is taking shape in the form of the Open Banking initiative. The CMA is expanding the European Banking Authority’s Payments Services Directive 2 (PSD2), in terms of the data that must be made available and is specifying more explicitly how this is done. The UK’s existing and relatively static banking services landscape will be radically transformed through the delivery of standardised “Open APIs”. Read more
Rivington Information Security: Information Security Consultancy and Managed Security services

Five steps to get started on your Identity and Access...

Managing user access to systems and data is a critical element of information security and is the foundation to protecting data from misuse.  Read more
CBG Cyber Business Growth

Cyber Business Growth Networking and Innovation Series – Security without... 9th February 2017, London

Cyber Business Growth is pleased to announce the next date in its Innovation series of round table discussions. ‘Security without boundaries’ will take a look at some of the issues faced by today’s organisations as they look to secure data in the cloud.   Read more
FIC 2017 - Forum International de la Cybersécurité - International Cybersecurity Forum

FIC 2017 – International Cybersecurity Forum 24th - 25th January 2016, Lille

The international cybersecurity forum is a platform aiming to promote a pan-european vision of cybersecurity and strengthen the fight against cybercrime. Read more

Time to re-engineer Identity and Access Management 14th December 2016, London

Whilst the benefits of introducing an Identity and Access Management (IAM) solution can be vast, many organisations are unable to comprehend some of the major challenges facing them when looking to implement an IAM solution. These challenges can cause issues when attempting to obtain senior management buy in. Read more
Ilex International Blog News

Single Sign-On (SSO) improves both user experience and security 17th November 2016, London

Organisations don’t need to choose between with user experience and security. Our latest blog post, ‘Single Sign-On: How to differentiate the good from the bad when it comes to user experience and security’, explores how implementing a Single Sign-On (SSO) solution removes the need to remember multiple logins – simplifying the authentication process while enhancing the security. Read more

How to establish your functional requirements for an Identity and... 2nd November 2016, London

In order for organisations to determine the effectiveness and efficiency of their identity and access management (IAM) systems, they first need to assess the extent to which their deployed systems fulfil their functional requirements. Simply put, do these IAM systems do what is needed by the organisation and its intended users? It is therefore necessary and logical to establish the functional requirements before assessing the features and functions of candidate IAM systems. Read more