eCommerce News Asia logo
The latest digital commerce news for Asian businesses

Identity stories

Story image
Artificial Intelligence
ForgeRock announces next gen identity orchestration capabilities
This week
ForgeRock has launched identity orchestration capabilities to enable enterprises to deliver improved user experiences secured by threat protection.
Story image
Facial recognition
Benefits vs risks of facial recognition technology
Last month
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions. 
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Incode Technologies
Last month
Jonathan Andresen joins us today to discuss the identification and authentication solutions offered by Incode.
Story image
Identity
Delinea report finds organisations are struggling to grasp identity-related security
July 2022
New research from Delinea has found that 84% of organisations, particularly in Australia, New Zealand, Singapore and Malaysia, have experienced an identity-related security breach in the past 18 months.
Story image
Small Business
Business Australia unveils new identity after rebranding
July 2022
Business Australia has rebranded to My Business with a new logo, brand positioning campaign and visual identity culminating in an online platform.
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
July 2022
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Cybersecurity
Security driving customer identity & access management adoption
June 2022
"CIAM allows businesses to embed a secure identity layer into their consumer and SaaS applications, facilitating secure, seamless end user experiences."
Story image
Cloud
Microsoft Entra - the new branch for identity and access solutions
June 2022
Microsoft launches its new Microsoft Entra product family and announces three new solutions: Permissions Management, Verified ID and Identity Governance.
Story image
Cloud
BeyondTrust integrates Password Safe solution with SailPoint
May 2022
BeyondTrust has announced the integration of BeyondTrust Password Safe with SailPoint identity security offerings.
Story image
Data Protection
FiVerity, Fortanix and Intel launch fraud prevention initiative
April 2022
“Confidential Computing is an initiative that requires leaders across the hardware and software industries in order to be successful."
Story image
HID Global
HID Global launches the new OMNIKEY Secure Element
March 2022
HID Global has introduced the OMNIKEY Secure Element, the first offering in its planned embedded and desktop reader portfolio.
Story image
Hybrid Cloud
Attivo Networks expands identity infrastructure for Azure AD
March 2022
The capabilities add hybrid environment support and provide remediation guidance for on-premises, cloud, and managed AD environments.
Story image
Artificial Intelligence
SentinelOne to acquire Attivo Networks, bringing identity to XDR
March 2022
SentinelOne has agreed to acquire Attivo Networks to extend its AI-powered prevention, detection, and response capabilities to identity-based threats.
Story image
Attivo Networks
Attivo Networks expands Active Directory Protection portfolio
March 2022
Attivo Networks has expanded its Active Directory Protection portfolio, adding capabilities to detect identity-based attacks at the domain controller.
Story image
Secure Code Warrior
The growing importance of establishing effective API security
March 2022
Cybercriminals have tended to focus on acquiring user credentials to maximise their ability to traverse targeted IT infrastructures.
Story image
Online verification
Main invests in verification specialist as demand grows
February 2022
Main Capital Partners has acquired a majority stake in InnoValor, the creator of ReadID - a global, mobile identity verification software provider using NFC.
Story image
Microsoft
Not enough businesses have authentication protection - Microsoft
February 2022
When it comes to our world online, protecting and defending our most valuable digital asset - our identity - is vital.
Story image
Mergers and Acquisitions
GBG acquires identity verification and anti-money laundering firm Cloudcheck
February 2022
GBG Group, a specialist in digital location, identity and identity fraud software, has announced that it has acquired Verifi Identity Services Limited, commonly known as Cloudcheck.
Story image
Customer experience
Excellent CX requires first party data and robust strategies, survey finds
January 2022
Brands must look at managing their data collection strategies, investment strategies, and deploying improvement in their identity management practices to reach, engage, and retain customers moving forward.
Story image
Cybersecurity
HID Global outlines several trends set to reshape the security industry in 2022 and beyond
January 2022
With more than 30 years in the industry, HID Global is in a unique position to identify key enablers, disruptive events, and game-changing developments that will shape the security landscape in 2022.
Story image
Customer experience
Auth0 launches Identity Platform on Microsoft Azure
December 2021
"The Auth0 Identity Platform on Azure can help unlock a secure and compliant cloud deployment experience for organisations seeking support across CIAM use cases."
Story image
Cybersecurity
Okta updates Workflows as standalone offering to accelerate innovation
December 2021
Okta has announced the availability of Okta Workflows as a standalone offering for all customers. 
Story image
GBG
IDC and GBG examine the Australian perspective on digital identity verification
November 2021
Customer identity is the foundation of customer engagement and trust, particularly during a time when organisations are onboarding more customers than ever before.
Story image
Privileged Access Management
Lack of visibility into user activity increase risk of credential theft and insider threats - CyberArk
November 2021
Almost half of organisations in the global survey say their visibility into user logs and user activity is limited, which creates ‘blind spots’ for potentially risky behaviour.