Guide: How to choose the right physical identity and access management (PIAM) system
A centralized physical identity and access management (PIAM) system makes life easier for everyone in your organization.
Whitepaper: Why use a central system for physical identity and access management (PIAM)?
A typical organization has a large number of identities to manage, and identities need to be added and removed when new employees join the organization and others leave.
Report: Read the complimentary Gartner report “Market guide for user authentication”
Identity and security company Nexus Group is cooperating with independent technology research and advisory firm Gartner to offer partners, customers and potential customers relevant and trustworthy information.
Guide: How to prepare for the GDPR – and turn it from foe to friend
The EU’s new General Data Protection Regulation (GDPR) aims to align the privacy regulatory environments in Europe. Many organizations are uncertain about how to cope with the requirements, and see the new regulation and its penalties as a threat.
Show all guides
“I wrote open standards to make strong authentication available to everybody”
GET TO KNOW Johan Rydell, Technology Director at identity and security company Nexus Group, and contributor to the authentication standards TOTP and OCRA.
11 steps to take control over your management of physical and/or digital access
A centralized identity and access management (IAM) system makes life easier for everybody in your organization.
Why the IAM software Nexus PRIME is becoming popular with Swedish municipalities
There are a number of identity and access management (IAM) systems on the market, but very few cover both the physical and digital world.
How Luxembourg enables widespread use of e-services in the private and public sectors
All people living and working in Luxembourg can get electronic identities (eIDs) issued by the national trust services provider LuxTrust.
PKI explained in 4 minutes
The public key infrastructure (PKI) security method has seen a major upswing in popularity, and is used for everything from enabling e-services to securing the internet of things.
10 reasons to implement two-factor authentication (2FA) today
It is time to say goodbye to passwords and implement two-factor authentication (2FA) instead.
Show all blog posts