SlideShare a Scribd company logo
1 of 32
Download to read offline
WWW.PORTALGUARD.COM
DESIGNING AND CREATING A SECURE WEB PORTAL
INTRODUCTION
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Data Security Considerations
Is this a Public vs. Private Portal?
How Will Credentials be Verified?
What Do Your Users Have Access To?
Will the Portal act as an IdP?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Compliance Considerations
HIPAA, COPPA, FERPA or PCI?
Organizational policy (e.g. password expiration)?
What about auditing and reporting?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Portal Integration
How best to instill user confidence & acceptance?
How important is branding?
Will you provide access to some or all data & apps?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
End User Experience
How and from where can they login?
How much can I do on my own?
Does one login open one door or many?
Do I receive meaningful feedback & information?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Technical Configuration
How and where is it hosted?
Can it handle a spike in user traffic?
How important is up-time?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Data Security Considerations
Is this a Public vs. Private Portal or Both?
How Will Credentials be Verified?
What Do You User Have Access To?
Will the Portal act as an IdP?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
What Type of Data is Available?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
How Do You Know Who is Who?
Are you using a user repository like Active Directory?
Will the portal be the Identity Provider?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Do You Need Single Sign-On Flexibility
Do you want to unlock the door once?
Do you need to unlock individual doors?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Compliance Considerations
Which regulations drive your field?
Navigating HIPAA, COPPA, FERPA, PCI.
Design for Compliance Success.
Don’t “Shoe-Horn” Compliance After the Fact.
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
On-Line Resources…
FERPA http://familypolicy.ed.gov/faq-page
COPPA http://www.coppa.org/comply.htm
HIPAA http://www.hhs.gov/hipaa
PCI https://www.pcisecuritystandards.org/
SOX https://en.wikipedia.org/wiki/Sarbanes-Oxley_Act
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Compliance Specific Requirements
Password length, complexity & expiration.
User reporting – Who, When, Where, How & Failures
Strong authentication – is 2-Factor required?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Integration Considerations
How do your users interact with your portal?
One key that opens many doors or something different?
Key design elements that engender confidence.
SAML vs. non-SAML enabled applications.
Giving your users the tools they need.
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
How Your Portal Presents Itself.
Immediate Login Screen
Branded & Identifiable
“You Shall Not Pass!”
Highly Secure
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
How Your Portal Presents Itself.
Specific areas of interest
Branded & Identifiable
More open to looking around
Still highly secure
Login is fully integrated
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Once Authenticated What Happens Next?
Does one key open may doors?
SAML vs. non-SAML enabled applications?
How are you tracking user activity?
Do you have any regulatory reporting requirements?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
End User Considerations
Walking your end users journey.
Ask Who, What, Where, When, How & Why?
Focus on efficiency, engagement and understanding.
Communicate expectations clearly.
How autonomous can your users be?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
What the user sees matters…
Consistent look & feel
Build their trust and comfort
Guide them appropriately
Get them where they want to go
Provide help & feedback quickly
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
End User Engagement
Specific feedback on expectations
Actionable items that can be acted on
Empower the user to aid their own progress
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Strong Understanding of…
Who are your users?
What they can and can’t gain access to.
Where they can gain access from.
When something goes wrong can they fix it?
How will you monitor their activities?
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
1. Data Security
2. Compliance
3. Integration
4. End User Experience
5. Technical
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
What’s “Under-the-Hood”?
On-premises vs. Cloud vs. Hybrid-cloud configuration
Understanding user traffic & demand patterns
Where are your users and how do they gain access
How will you handle system outages & down-time
Disaster recovery implications
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Load Balancing
Demand Spikes
Inc. Response Time
Max. User Satisfaction
Failover Protected
Guarantee Uptime
Maint. & Upkeep
Regular Backups
Disaster Recovery
Regulatory Comp.
Asset Protection
Things to Consider…
http://www.portalguard.com/resources/whitepapers-1.html
Other Items to Consider…
What regulatory compliance issues do you face?
Total Cost of Ownership (Assets + Manpower)
Hybrid Cloud Best Practices
Capability & Capacity of Your Existing IT Dept.
Things to Consider…
Security should never be an
afterthought when integrating a
portal into your environment.
http://www.portalguard.com/resources/whitepapers-1.html
Things to Consider…
THANKS FOR JOINING US…
http://www.portalguard.com/resources/whitepapers-1.html

More Related Content

What's hot

Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access ManagementLance Peterman
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...ForgeRock
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity ForgeRock
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraForgeRock
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarBrian Campbell
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 

What's hot (20)

Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
Identity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations SeminarIdentity and Access Management - RSA 2017 Security Foundations Seminar
Identity and Access Management - RSA 2017 Security Foundations Seminar
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 

Viewers also liked

Internet Now! centres phase 1 northern Uganda
Internet Now! centres phase 1 northern UgandaInternet Now! centres phase 1 northern Uganda
Internet Now! centres phase 1 northern UgandaMartin van der Steen
 
How Linked Data is transforming eGovernment
How Linked Data is transforming eGovernmentHow Linked Data is transforming eGovernment
How Linked Data is transforming eGovernmentNikos Loutas
 
eGovernment Action Plan 2016-2020, UC
eGovernment Action Plan 2016-2020, UCeGovernment Action Plan 2016-2020, UC
eGovernment Action Plan 2016-2020, UCStéphane VINCENT
 
Europe – eGovernment Benchmark 2012 background report
Europe – eGovernment Benchmark 2012   background reportEurope – eGovernment Benchmark 2012   background report
Europe – eGovernment Benchmark 2012 background reportVictor Gridnev
 
Web2 0 for eGovernment: why and how?
Web2 0 for eGovernment: why and how?Web2 0 for eGovernment: why and how?
Web2 0 for eGovernment: why and how?osimod
 
Bahrain eGovernment: Towards a Better Life
Bahrain eGovernment: Towards a Better LifeBahrain eGovernment: Towards a Better Life
Bahrain eGovernment: Towards a Better LifeUnited Interactive™
 
Portal, Telco And Mobile
Portal, Telco And MobilePortal, Telco And Mobile
Portal, Telco And MobileSeungyul Kim
 
Federal Government Standard Web Portal developed at Joomla!
Federal Government Standard Web Portal developed at Joomla!Federal Government Standard Web Portal developed at Joomla!
Federal Government Standard Web Portal developed at Joomla!rafaelberlanda
 
Unrw Aat60 Visual Highlights
Unrw Aat60 Visual HighlightsUnrw Aat60 Visual Highlights
Unrw Aat60 Visual HighlightsFroehlich Fritz
 
TRIAS eGovernment introduction
TRIAS eGovernment introductionTRIAS eGovernment introduction
TRIAS eGovernment introductionTRIAS
 
An eGovernment Research and Innovation Framework
An eGovernment Research and Innovation Framework An eGovernment Research and Innovation Framework
An eGovernment Research and Innovation Framework Trond Knudsen
 
ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012Cyril Soeri
 
Web portal 4 local government
Web portal 4 local governmentWeb portal 4 local government
Web portal 4 local governmentMuhammad Farooq
 
Capitalizing on Human Potentials with eGovernment 2.0
Capitalizing on Human Potentials with eGovernment 2.0Capitalizing on Human Potentials with eGovernment 2.0
Capitalizing on Human Potentials with eGovernment 2.0Žiga Turk
 
From eGovernment to Smart Government, United Arab Emirates
From eGovernment to Smart Government, United Arab EmiratesFrom eGovernment to Smart Government, United Arab Emirates
From eGovernment to Smart Government, United Arab EmiratesUNDP India
 
What is web portal
What is web portalWhat is web portal
What is web portalShweta Gupta
 
Oxfam International's KIC Portal: Web 2.0 in KM Initiatives
Oxfam International's KIC Portal: Web 2.0 in KM InitiativesOxfam International's KIC Portal: Web 2.0 in KM Initiatives
Oxfam International's KIC Portal: Web 2.0 in KM InitiativesSarah Burns
 

Viewers also liked (20)

Internet Now! centres phase 1 northern Uganda
Internet Now! centres phase 1 northern UgandaInternet Now! centres phase 1 northern Uganda
Internet Now! centres phase 1 northern Uganda
 
Vinnova: eGovernment of Tomorrow
Vinnova: eGovernment of TomorrowVinnova: eGovernment of Tomorrow
Vinnova: eGovernment of Tomorrow
 
EU eGovernment Benchmark
EU eGovernment BenchmarkEU eGovernment Benchmark
EU eGovernment Benchmark
 
How Linked Data is transforming eGovernment
How Linked Data is transforming eGovernmentHow Linked Data is transforming eGovernment
How Linked Data is transforming eGovernment
 
eGovernment Action Plan 2016-2020, UC
eGovernment Action Plan 2016-2020, UCeGovernment Action Plan 2016-2020, UC
eGovernment Action Plan 2016-2020, UC
 
Europe – eGovernment Benchmark 2012 background report
Europe – eGovernment Benchmark 2012   background reportEurope – eGovernment Benchmark 2012   background report
Europe – eGovernment Benchmark 2012 background report
 
Web2 0 for eGovernment: why and how?
Web2 0 for eGovernment: why and how?Web2 0 for eGovernment: why and how?
Web2 0 for eGovernment: why and how?
 
Bahrain eGovernment: Towards a Better Life
Bahrain eGovernment: Towards a Better LifeBahrain eGovernment: Towards a Better Life
Bahrain eGovernment: Towards a Better Life
 
Portal, Telco And Mobile
Portal, Telco And MobilePortal, Telco And Mobile
Portal, Telco And Mobile
 
Federal Government Standard Web Portal developed at Joomla!
Federal Government Standard Web Portal developed at Joomla!Federal Government Standard Web Portal developed at Joomla!
Federal Government Standard Web Portal developed at Joomla!
 
Unrw Aat60 Visual Highlights
Unrw Aat60 Visual HighlightsUnrw Aat60 Visual Highlights
Unrw Aat60 Visual Highlights
 
TRIAS eGovernment introduction
TRIAS eGovernment introductionTRIAS eGovernment introduction
TRIAS eGovernment introduction
 
An eGovernment Research and Innovation Framework
An eGovernment Research and Innovation Framework An eGovernment Research and Innovation Framework
An eGovernment Research and Innovation Framework
 
ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012ICT Association Suriname Presentation On eGovernment 2012
ICT Association Suriname Presentation On eGovernment 2012
 
Web portal 4 local government
Web portal 4 local governmentWeb portal 4 local government
Web portal 4 local government
 
Capitalizing on Human Potentials with eGovernment 2.0
Capitalizing on Human Potentials with eGovernment 2.0Capitalizing on Human Potentials with eGovernment 2.0
Capitalizing on Human Potentials with eGovernment 2.0
 
Reasons For E Government
Reasons For E GovernmentReasons For E Government
Reasons For E Government
 
From eGovernment to Smart Government, United Arab Emirates
From eGovernment to Smart Government, United Arab EmiratesFrom eGovernment to Smart Government, United Arab Emirates
From eGovernment to Smart Government, United Arab Emirates
 
What is web portal
What is web portalWhat is web portal
What is web portal
 
Oxfam International's KIC Portal: Web 2.0 in KM Initiatives
Oxfam International's KIC Portal: Web 2.0 in KM InitiativesOxfam International's KIC Portal: Web 2.0 in KM Initiatives
Oxfam International's KIC Portal: Web 2.0 in KM Initiatives
 

Similar to Designing and Creating a Secure Web Portal

ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017Salesforce Partners
 
User Experience Strategy
User Experience StrategyUser Experience Strategy
User Experience StrategyJeromeNadel
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxgholly1
 
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docxEmerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docxchristinemaritza
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFranky Redant
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
Labelling – are you serious
Labelling – are you seriousLabelling – are you serious
Labelling – are you seriousPhil Archer
 
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...InnoTech
 
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...Gina Montgomery, V-TSP
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab workPragya Bisht
 
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...Jack Molisani
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?BCS ProSoft
 
The Double Check - Leveraging Microsoft Best Practices for Information Govern...
The Double Check - Leveraging Microsoft Best Practices for Information Govern...The Double Check - Leveraging Microsoft Best Practices for Information Govern...
The Double Check - Leveraging Microsoft Best Practices for Information Govern...Heather Newman
 
Performance Management at Employment Hero
Performance Management at Employment Hero Performance Management at Employment Hero
Performance Management at Employment Hero Luong Vo
 
PersonAll Social Business Plateform US
PersonAll Social Business Plateform USPersonAll Social Business Plateform US
PersonAll Social Business Plateform USPersonall SAS
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
 

Similar to Designing and Creating a Secure Web Portal (20)

ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017
 
Web portals & vortals
Web portals & vortalsWeb portals & vortals
Web portals & vortals
 
User Experience Strategy
User Experience StrategyUser Experience Strategy
User Experience Strategy
 
Portal
PortalPortal
Portal
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docxEmerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
 
Web 2.0 Workshop
Web 2.0 WorkshopWeb 2.0 Workshop
Web 2.0 Workshop
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Labelling – are you serious
Labelling – are you seriousLabelling – are you serious
Labelling – are you serious
 
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low-Hanging Fruits for SharePoint 2013 No-Code...
 
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...
Impact Your Business: Identify Low Hanging Fruits for SharePoint 2013 No-Code...
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab work
 
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...
LavaCon 2017 - Building an Enterprisewide Content Platform—and Why DITA will ...
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
The Double Check - Leveraging Microsoft Best Practices for Information Govern...
The Double Check - Leveraging Microsoft Best Practices for Information Govern...The Double Check - Leveraging Microsoft Best Practices for Information Govern...
The Double Check - Leveraging Microsoft Best Practices for Information Govern...
 
Performance Management at Employment Hero
Performance Management at Employment Hero Performance Management at Employment Hero
Performance Management at Employment Hero
 
PersonAll Social Business Plateform US
PersonAll Social Business Plateform USPersonAll Social Business Plateform US
PersonAll Social Business Plateform US
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
 

More from PortalGuard

Let's Build a Better Password
Let's Build a Better PasswordLet's Build a Better Password
Let's Build a Better PasswordPortalGuard
 
PortalGuard Product Tour
PortalGuard Product TourPortalGuard Product Tour
PortalGuard Product TourPortalGuard
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving CompliancePortalGuard
 
PortalGuard Platform
PortalGuard PlatformPortalGuard Platform
PortalGuard PlatformPortalGuard
 
Already Have a Solution?
Already Have a Solution? Already Have a Solution?
Already Have a Solution? PortalGuard
 
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopPortalGuard
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsPortalGuard
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and CompliancePortalGuard
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachPortalGuard
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachPortalGuard
 
Password Security and CJIS Compliance
Password Security and CJIS CompliancePassword Security and CJIS Compliance
Password Security and CJIS CompliancePortalGuard
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 

More from PortalGuard (15)

Let's Build a Better Password
Let's Build a Better PasswordLet's Build a Better Password
Let's Build a Better Password
 
PortalGuard Product Tour
PortalGuard Product TourPortalGuard Product Tour
PortalGuard Product Tour
 
SSPM Retail
SSPM RetailSSPM Retail
SSPM Retail
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
 
PortalGuard Platform
PortalGuard PlatformPortalGuard Platform
PortalGuard Platform
 
Already Have a Solution?
Already Have a Solution? Already Have a Solution?
Already Have a Solution?
 
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple Passwords
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor ApproachContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
Password Security and CJIS Compliance
Password Security and CJIS CompliancePassword Security and CJIS Compliance
Password Security and CJIS Compliance
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 

Recently uploaded

A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

Designing and Creating a Secure Web Portal