The Trelica blog

FILTERS
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Business-led IT
SaaS Discovery
Shadow IT

Shadow IT – three things we learned when we got the flashlight out

Preparing for what you're likely to discover lurking in the shadows is the first step to implementing a holistic solution...
...
September 21, 2021
Access Risk
Information Security

“Sign in with Google” and the hidden cost of convenience

Social logins provide user convenience and remove the risks associated with weak or reused passwords. That’s not the full...
...
September 8, 2021
Access Risk
Identity Management

What sort of Single Sign-On should I use: OpenID Connect or SAML2?

Single Sign-On (SSO) does what it says on the tin: it lets you use a single set of login credentials (typically username...
...
August 27, 2021
Access Risk
Identity Management

The hidden truth about Single Sign-On that SaaS vendors exploit

Single Sign-On is great - it makes it easier for users to access applications. So why do SaaS vendors often charge a...
...
August 18, 2021
Get started

Sound good so far?