Whitepaper: How to implement two-factor authentication (2FA) to Office 365 with Nexus Personal Mobile
This whitepaper goes through the wide range of 2FA solutions available, and the importance of choosing a solution that lives up to basic requirements.
Guide: How to use one Smart ID for all physical and digital access
Do you want your users to be able to identify themselves visually, log in, open doors, sign documents, make payments and use follow-me printing – with one single Smart ID? In this guide, we go through how you can easily make this a reality.
Report: Read the complimentary Gartner report “Hype cycle for identity and access management technologies, 2017”
Identity and security company Nexus Group is cooperating with independent technology research and advisory firm Gartner to offer partners, customers and potential customers relevant and trustworthy information.
Guide: How to use your organization’s ID badges to enable electronic signatures
A critical puzzle piece when digitizing in the public sector is enabling reliable electronic signatures. This can be easier and cheaper than you might think, since existing infrastructure for managing ID badges and logins can be reused to implement advanced digital signatures.
Show all guides
Why you should protect Office 365 with an easy-to-use and versatile 2FA solution
Implementing two-factor authentication (2FA) for logging into Office 365 is one important puzzle piece in utilizing the cloud without compromising security. “There are also many advantages to choosing an easy-to-use and versatile 2FA solution,” says Johan Nylén, partner solutions architect at identity and security company Nexus Group.
How to comply with the PSD2 and its regulatory technical standards
The revised Payment Services Directive (PSD2) puts high demands on the financial industry to improve security and open up for third-party providers. The detailed technical rules for the PSD2 have now been released. Bjørn Søland, technical expert at identity and security company Nexus Group, explains what the new rules mean and how to comply with them.
“The market for security as cloud services has a great potential”
GET TO KNOW Tamas Horvath, product manager of PKI as a Service at identity and security company Nexus Group. “The security method PKI has had a big upswing. At the same time, more and more companies are overcoming data protection and security skepticism and are making use of the advantages of cloud computing. This combination makes PKI as a service appear very attractive, for securing both IoT and traditional IT,” he says.
“Excellent communication is the secret for world-class support”
GET TO KNOW Petra Arnold, head of support at identity and security company Nexus Group. “The secret sauce for providing world-class support is ensuring excellent communication with the customers. This keeps them involved and assures them that you understand them and their situation,” she says.
The forgotten half of IoT security – and how to fix it
Inadequate internet of things (IoT) security has gotten a lot of attention lately, and most experts say that providing all entities with PKI-based certificates is the way to go. “They are right. But what is all too often forgotten is that you have to secure the people part of IoT too,” says Daniel Hjort, director for Smart ID management at identity and security company Nexus Group.
“Hey, IoT prophets of doom – I’ve made an action-list for you”
There are a lot of internet of things (IoT) prophets of doom out there. Most recently, the mobile phone industry has aired their concerns. And of course, if security is put on the back burner, there will inevitably be very serious problems. So, I’ve made a handy action-list for you, writes Bjørn Søland, IoT expert at identity and security company Nexus Group.
Show all blog posts