Sep 22, 2020
Unpacking the tech: how passwordless key-based authentication works
Key-based authentication vs password: how public key authentication works and why Auth app is the next step forward. We unpack the tech that makes Auth IAM solutions tick.
Aug 17, 2020
How passwordless recovery works when you get locked out of an IAM account
Passwordless authentication makes our digital lives easier. No doubts. But what happens when you lose the device or key you use to log in? Does it mean you lose your account for good or can you still reset it? Find out.
Jun 15, 2020
Customer Identity Access Management 101: How the Best CIAM Solutions Stack Up
What Customer Identity Access Management (CIAM) is and how it differs from IAM. Find out how to select a dedicated solution with the features that can meet the high bar required of a customer-facing product.
May 20, 2020
Federated identity: the key to securing digital business
An overview of federated identity, single sign-on, pros and cons for enterprise identity management systems. Learn ways to improve the traditional federated authentication.
May 5, 2020
Why Multi-Factor Authentication is a must for your business
Multi-factor authentication (MFA) was once the concern of site admins and of enterprises overseeing highly sensitive work. Not any more. Today, MFA is a staple of the defensive toolset of businesses the world over.
Apr 15, 2020
Decentralized Identity & Access Management with Auth
As our Auth solutions have just kicked off, we're sharing details on the features and benefits they bring to business and individuals.
Nov 30, 2018
How to Mitigate Cryptocurrency Exchange Security Risks Using Remme Auth
For the purposes of our paper, we investigated ways in which a major exchange such as Binance or Bittrex could reduce cyber threats whilst balancing these responsibilities with ease of use and functionality.
Nov 21, 2018
Utility Sector Market Penetration Research
This research paper investigates areas of the utilities sector that could benefit through the use of the Remme solution with a focus on use cases where the maximum potential may be realised.