IAM customer scenario

A leading financial institution chose KCOM to drive a cross-organisational digital transformation project and deliver a federated 'single sign-on' service so it's corporate clients' employees could easily access their data securely. 

The project was so successful that the solution is being rolled out to other user communities.

Find out more

Shield_image.png

Understanding Identity and Access Management

In case you missed it, we have developed an eGuide outlining the principles and wider advantages that can be delivered through IAM as well as some of the common pitfalls in deployments.

Download eGuide

Catch up with some of our recent blog posts

The IoT – redefining identity and access management

Identity and Access Management has traditionally been all about security - but this is changing as businesses start to manage more digital identities, and as the IoT brings in billions of new devices.

Find out How the IoT is changing Identity and Access Management.

Read blog

Don’t de-rail your IAM project before it has even begun!

For many organisations, the decision to deploy Identity and Access Management (IAM) has already been taken. The business case is clear and agreed, the budget is signed off and the project is being rolled out, but all too often, organisations rush to deploy the technology without sufficient prior planning.

Find out more

Get in touch