Identity and Access Management Explained

Blog : IDAM, Identity Management, Video

Paul Saer, our Head of Public Sector, has made a series of videos explaining identity and access management services (IDAM). The 10 part series looks at the different aspects of Identity and Access Management services...

5 reasons to use identity and access management services

Blog : IDAM, Identity Management

Identity and access management (IDAM) is the process of managing digital identities within an organisation, which includes restricting or allowing access to certain data. It's a vital step in securing the data your organisation holds,...

Identity and access management explained

Blog : Identity Management

What is identity and access management? Identity and access management (IDAM) is the process of managing digital identities within an organisation, including restricting or allowing access to certain data. Through identity and access management,...

Identity and Access Management: using IDAM solutions to fix complex AD structures

Blog : Aurora, Cloud and Infrastructure, IDAM, Identity Management

Over the last few weeks, we have looked at how a good Identity and Access Management (IDAM) solution can help to bolster your cyber security stance and improve user productivity, but this is not...

Identity and Access Management – How to stop your users taking you to the data apocalypse: part 2

Blog : Aurora, Identity Management

​So, to recap on last week's blog, we talked about how we as individuals have judiciously spread our identity information all over the internet in our private lives, which gives away how we manage passwords...

Identity and Access Management – How to stop your users taking you to the data apocalypse: part 1

Blog : Aurora, Identity Management

This week, Core is presenting on behalf of One Identity at IDM Whitehall, and I thought it would be fitting for this weeks’ blog, the latest in my Identity and...

Identity and Access Management – Problems with provisioning and deprovisioning

Blog : Aurora, cloud services, Identity Management

One of the major changes that customers face when adopting cloud solutions and platforms is the difference in criticality of provisioning and, specifically, deprovisioning user access. BC – Before cloud In the old world of on-premise infrastructure,...

Identity and Access Management – Critical requirement for cloud

Blog : Aurora, IDAM, Identity Management

It’s been very interesting to see the uptick in conversation and reference to the criticality of a solid Identity and Access Management solution when customers are looking at adopting cloud-based solutions. The last four or...

Using predictive analytics powered by Microsoft Office 365 and machine learning to transform education in the UK

Blog : Office 365, Power BI

I was fortunate enough to attend a Microsoft Education Partner day, which featured a range of seminars and presentations covering some of the latest Microsoft technologies available to the education sector. The talk that particularly captured...

5 identity problems that IDAM solutions solve

Blog : Identity as a Service, Identity Management

Identity and access management is an integral part of any organisation's security. Having a good IDAM solution in place makes sure only authorised people can access your data and files, in line with their...

What is the difference between managed services and hardware as a service?

Blog : Managed Services

In today's IT landscape, there are lots of 'as a service' solutions (where certain aspects of IT are provided as a service by a third party) that can help organisations work more efficiently and become...

What is Microsoft 365 and how can it benefit the UK Public Sector?

Blog : Microsoft 365 Enterprise

In May 2018, the Crown Commercial Service announced a new Digital Transformation Agreement, developed in collaboration with Microsoft, to promote and achieve a Cloud-first vision for the UK Public Sector and enable greater access...

Office 365 and Azure: Microsoft drives forward the ‘single patient view’

Blog : Azure, Office 365

Microsoft quietly progresses the single view of the patient/citizen Love it or hate it, Cloud computing is delivering on a number of levels. Customers are saving money and benefiting from best-in-class hardware, support and up-time...

Five opportunities for technology innovation in local and regional government

Blog

The era of austerity has resulted in profound challenges for local and regional government, as it has for many other industries, communities and families. According to a report by the National Audit...

Core present at #OneIdentityUNITE

News : Aurora, Cloud and Infrastructure, Identity as a Service, Identity Management, One Identity

Core were delighted to be asked to present at the recent #OneIdentityUNITE conference in Nice, France. We presented two sessions at the conference: one to the partner community on Monday, followed by a second presentation on...

Core wins One Identity’s UK Partner of the Year award

News : Aurora, Cloud and Infrastructure, Identity as a Service, Identity Management, One Identity

Core is delighted to have been named UK Partner of the Year by One Identity at their recent UNITE Conference. This prestigious award recognises the success of Core's cloud-hosted Identity as a Service platform Aurora,...

Access Management Cloud Service Provider of the Year Award

News : Cloud and Infrastructure

​Core awarded the One Identity Access Management Cloud Service Provider of the Year Award Core are delighted to have received the “Access Management Cloud Service Provider of the Year" award, at the...

One Identity extends top-rated Active Roles solution to Azure Active Directory

News : Cloud and Infrastructure

One Identity, a recognized leader in identity and access management, today announced a new Active Roles version that extends best-in-class features to conquer the security and management challenges organizations face as they grapple...

Core explains the value of One Identity Active Roles to your organisation

News : Cloud and Infrastructure

One Identity is an independent brand specialising in Identity Access Management Solutions. They deliver Identity Governance and help businesses to face IAM challenges through their solution, One Identity Active Roles. The solutions offered by One Identity...

Core awarded a place on Crown Commercial Service G-Cloud 11 framework

News

2nd July 2019: Core Technology Systems, a Microsoft Gold Partner and specialist cloud solutions provider, is delighted to announce they have been awarded a place on the G-Cloud 11 framework for supply of goods and...

How do Managed Services work? (Visualised)

Blog : cybersecurity, desktop as a service, hosting, Identity Management, Infographic, managed IT services, process

The term “managed service” refers to the management of a company’s entire, or specific parts, of their IT operations. It is the name given to a range of IT services which are provided to a...