Common identity management solutions with the better customer experience and enhanced security

Password-less authentication
Two-factor/Multi-factor authentication
Cloud identity
Federated identity
Intelligent identity

--

--

--

Mobile application and connected-devices development consultant. Enthusiastic and excited about digital transformation era.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Bug Bounty — How to approach Vulnerabilities ( PART 1 )

3u Tool For Chromebook

Smart Contract Wallet — Part 1: Introduction

Swipe Right On Cyber Security

Jason Hicks of Kudelski Security: 5 Things You Need To Know To Optimize Your Company’s Approach to…

Digital Agency: how to navigate, own and understand data and its complex economy

XPath Injection

{UPDATE} Can't Catch This Racing Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Shankar Kumarasamy

Shankar Kumarasamy

Mobile application and connected-devices development consultant. Enthusiastic and excited about digital transformation era.

More from Medium

Monitor events with ELK Stack : Deploy ELK Stack with Docker Compose

Security in DevOps AKA DevSecOps

Shifting left to improve application security

Shifting Left To Improve Application Security — Photo by <a href=”https://unsplash.com/@alexandermils?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Alexander Mils</a> on <a href=”https://unsplash.com/?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText">Unsplash</a>

Cloud security with flaws.cloud