• Ping Identity the challenge of 'run'

Ping Identity – the Challenge of ‘Run’

17th October 2017

Most IT professionals are familiar with the typical cycle of IT projects, which usually run through [...]

Read More
  • Okta LDAP Integration

How to set up Okta LDAP integration for Microsoft AD LDS

13th June 2017

ProofID Technical Consultant, Theo Chimbga provides instructions on how to configure Lightweight [...]

Read More
  • ProofID IDaaMS

ProofID Launches Ping Identity as a Managed Service

19th January 2017

ProofID has launched Ping Identity as a Managed Service (ProofID IDaaMS) in order to support and dev [...]

Read More
  • 5 B2B Questions for your Identity and Access Management (IAM) Provider

5 B2B Questions for your Identity and Access Management (IAM) Provider

31st October 2016

When thinking about integrating customers, suppliers and other partners into your business through t [...]

Read More
  • b2b security

The Common Pitfalls of B2B Security

25th October 2016

As organization organisation s extend their technology to partners to realise business benefit the i [...]

Read More
  • Using PingAccess to limit access to web applications based on browser

Using PingAccess to limit access to web applications based on browser

31st August 2016

Recently, we at PEGRight have seen an increasing demand to limit access to Web Applications (published through PingAccess) based on the browser criteria, such as user-agent.

Read More
  • Using PingAccess to limit access to web applications based on browser

PingAccess Role Based Access Control (RBAC)

22nd August 2016

This blog article will show you how to use Active Directory group membership to determine if someone should have access to the PingAccces console.

Read More
  • Why financial institutions need to be more agile

Why financial institutions need to be more agile

8th August 2016

Thinking about fintech for a moment, there are already some major success stories with companies suc [...]

Read More