The Trelica blog
FILTERS
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Business-led IT
SaaS Discovery
Shadow IT
Shadow IT – three things we learned when we got the flashlight out
Preparing for what you're likely to discover lurking in the shadows is the first step to implementing a holistic solution...
...
Access Risk
Information Security
“Sign in with Google” and the hidden cost of convenience
Social logins provide user convenience and remove the risks associated with weak or reused passwords. That’s not the full...
...
Access Risk
Identity Management
What sort of Single Sign-On should I use: OpenID Connect or SAML2?
Single Sign-On (SSO) does what it says on the tin: it lets you use a single set of login credentials (typically username...
...
Access Risk
Identity Management
The hidden truth about Single Sign-On that SaaS vendors exploit
Single Sign-On is great - it makes it easier for users to access applications. So why do SaaS vendors often charge a...
...
Get started