{"id":9389,"date":"2020-10-30T10:37:02","date_gmt":"2020-10-30T09:37:02","guid":{"rendered":"https:\/\/stage.dataductus.com\/?p=9389"},"modified":"2025-03-21T12:01:01","modified_gmt":"2025-03-21T11:01:01","slug":"secure-your-digital-services","status":"publish","type":"post","link":"https:\/\/ductus.global\/sv\/secure-your-digital-services\/","title":{"rendered":"Secure your digital services"},"content":{"rendered":"\n\n\n <section class=\"hero-banner top-banner centered has-ductus-blue-background-color ductus-banner-block alignfull banner-module\" style=\"min-height: px\">\n    <div id=\"top-banner-block_dd326e94f3fc07d71096db6123645073\"  class=\"banner-content\">\n        <figure id=\"banner-image-block_dd326e94f3fc07d71096db6123645073\" class=\"banner-image\" ><\/figure>\n        <div class=\"inner has-ductus-blue-background-color has-white-color has-text-color\">\n\t\t\t\n\t\t\t\t\t\t\t<h1 class=\"h1 banner-title\"> Secure your digital services<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n<\/section>\n\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-preamble-font-size\">The threat of cyber attacks has increased dramatically in recent years as more services go online. Software today must address identity and authentication, access control (authorization), confidentiality, and integrity at every level to minimize the risk and damage that could be caused by a security breach. It&#8217;s imperative that you secure your digital services.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-background\" style=\"background-color:#cddad5\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-left\" id=\"h-we-can-help-you-to-develop-your-digital-services-nbsp-using-these-cornerstones\">We can help you to develop your digital services&nbsp;using these cornerstones:<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#Service-desk-advising\"><\/a><strong><strong><strong><strong><a href=\"#identify\">Identity &amp; access control<\/a><\/strong><\/strong><\/strong><\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong><strong><strong><a href=\"#integrate\">API management &amp; integration<\/a><\/strong><\/strong><\/strong><\/strong><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong><strong><a href=\"#integrate\"><\/a><strong><strong><a href=\"#secure\">Secure software development<\/a><\/strong><\/strong><\/strong><\/strong><\/strong><\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"identify\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Identity and access control<\/h2>\n\n\n\n<p>The identity is one of the core elements in a secure solution, maybe even the most critical component. If you do not know who is requesting your data, it is impossible to apply access control.&nbsp;<\/p>\n\n\n\n<p>We can help you setup identity and authorization for your needs.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"637\" height=\"491\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2.png\" alt=\"\" class=\"wp-image-30355\" style=\"width:319px;height:246px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2.png 637w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-300x231.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-65x50.png 65w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-572x441.png 572w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Authenticators<\/strong><\/strong>&nbsp;<br>An authenticator is the means used to confirm a user&#8217;s identity, that is, to perform digital authentication. Social media, BankId, and fingerprints are common ways to authenticate, but new techniques emerge that the solution need to adhere to.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Authorization service<\/strong><\/strong>&nbsp;<br>The authorization service produces a token that contains the user&#8217;s identity and information needed to perform access control (authorization). Think of the token as a ticket that gives you access to API:s, data, and services, the ticket controller validates the information on the ticket (authorization) before you are allowed to pass.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>User management<\/strong><\/strong>&nbsp;<br>The authentication server needs to verify and access data related to the authenticated identity. Today&#8217;s online services are often complex combinations of several underlying systems, many times silos. The user management can be seen as a kind of user broker (SCIM) to sync users across these silo systems.&nbsp;\u202f&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>If you require any further information, feel free to <a href=\"#contact-us\">contact us<\/a><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"integrate\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">API management &amp; integration&nbsp;<\/h2>\n\n\n\n<p>The API:s are the digital interfaces of your business, both internally and externally. The API Manager becomes the central point that provides the API:s with documentation, measurements, and a defence line.&nbsp;\u202f&nbsp;<\/p>\n\n\n\n<p>We can help you design API:s and setup API Manager to authenticate and authorize users and be the first line of defence of your services.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img decoding=\"async\" width=\"716\" height=\"572\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/api-copy.png\" alt=\"\" class=\"wp-image-9391\" style=\"width:358px;height:286px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/api-copy.png 716w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/api-copy-300x240.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/api-copy-63x50.png 63w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/api-copy-552x441.png 552w\" sizes=\"(max-width: 716px) 100vw, 716px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>API Manager<\/strong><\/strong><br>API management is the process of creating and publishing API:s, controlling access, collecting and analysing usage statistics, and reporting on performance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Tokens<\/strong><\/strong>&nbsp;<br>API Manager trust and evaluates tokens issued by your token server to decide if the call should be let through or not.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Developer portal<\/strong><\/strong>&nbsp;<br>Collaboration platform for developers to access and test your API:s and provides the API documentation.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Integration<\/strong><\/strong>&nbsp;<br>We can all agree on that customer facing \u201cpublic\u201d API:s have to be secure but let\u2019s not forget about the \u201cinternal\u201d integration endpoints that may be publicly available and potential data leaks. The integration layer can also be used to secure data from legacy systems if they do not support modern authorization technologies.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>If you require any further information, feel free to <a href=\"#contact-us\">contact us<\/a><\/p>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"secure\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Secure&nbsp;Software development&nbsp;<\/h2>\n\n\n\n<p>Agile software development and DevOps are widely adopted methodologies to develop software; optimized for focus on functionality and short time to market. Unfortunately, security has not been a core concern of these methodologies. This has led to that developers have little or no guidance on how to develop secure software and that security is left to the very end of the project when time and cost constraints are at their maximum and short-cuts in the security implementation is far to common.<\/p>\n\n\n\n<p>We can provide developers with a reliable security architecture consisting of best-practices and reusable well-designed software security components that will allow the team to keep focusing on customer value and time to market while still delivering secure software.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img decoding=\"async\" width=\"700\" height=\"521\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev.png\" alt=\"\" class=\"wp-image-9392\" style=\"width:350px;height:261px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev.png 700w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-300x223.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-67x50.png 67w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-593x441.png 593w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Think security in all phases<\/strong><\/strong>&nbsp;<br>Security should be thought of from beginning to end, through design, implementation and operations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Understand your service<\/strong><\/strong>&nbsp;<br>It\u2019s not until you understand your service end to end that you will have enough information to set the correct level of security. Who is the audience? How sensitive is the data? What level of access control do we need?<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Use standards, guidelines and proven technology<\/strong><\/strong><br>Build your service using best practice and rely on proven technology, incorrect implementation and use of open source components may itself become a security threat. Provide implementation guidelines and strategies for how the choose third party components and technologies.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>DevSecOps<\/strong><\/strong>&nbsp;<br>DevSecOps routines with configuration management will secure the life cycle management of the software and surrounding environments.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>If you require any further information, feel free to <a href=\"#contact-us\">contact us<\/a><\/p>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-ductus-white-color has-ductus-blue-background-color has-text-color has-background has-link-color wp-elements-3b0fd270696a03fcd34cf0965a974bef\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-regulations-nbsp\">Regulations&nbsp;<\/h2>\n\n\n\n<p>It&#8217;s important to identify any regulations such as GDPR, PSD2, that could affect the service as early as possible. If there are any regulations to comply with, it&#8217;s important to enforce rules in the right place at the right time. That will minimize the risk of data leakage and that it is not possible to bypass it.<\/p>\n\n\n\n<p>We can help you to analyze and classify data to take appropriate actions to comply with regulations. We can also help you to implement the controls according to best-practices and prepare the service for future changes.<\/p>\n\n\n\n<p class=\"has-ductus-white-color has-text-color has-link-color wp-elements-444c013625db53a14d0f8daa359944e4\">Read our <a href=\"https:\/\/ductus.global\/helping-banks-meet-psd2-and-the-continued-implementation-of-open-banking-regulations\/\" style=\"color:#ffffff;\">insight on PSD2<\/a>.<\/p>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-background\" style=\"background-color:#ede6ed\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-customer-use-cases\"><span class=\"tadv-color\">Customer use cases<\/span><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"261\" height=\"261\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-bank.png\" alt=\"\" class=\"wp-image-29418\" style=\"width:100px;height:100px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-bank.png 261w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-bank-150x150.png 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-bank-50x50.png 50w\" sizes=\"(max-width: 261px) 100vw, 261px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-banking-nbsp\"><strong>Banking<\/strong>&nbsp;<\/h4>\n\n\n\n<p>We have helped several banks to secure their APIs to comply with Payment Service Directive (PSD2) regulations. Banks are under constant pressure to comply with new regulations, especially in the EU. With the Revised Directive on Payment Services (PSD2)   banks APIs will be open to third-party actors to build new applications around the financial institution. These API:s must use Strong Customer Authentication to comply with the PSD2 directive from the European Payments Council.&nbsp; <\/p>\n\n\n\n<p>Read our <a href=\"https:\/\/ductus.global\/helping-banks-meet-psd2-and-the-continued-implementation-of-open-banking-regulations\/\">insight on PSD2<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office.png\" alt=\"\" class=\"wp-image-29419\" style=\"width:100px;height:100px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office.png 500w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office-300x300.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office-150x150.png 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office-50x50.png 50w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-office-441x441.png 441w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-public-sector\"><strong>Public sector<\/strong><\/h4>\n\n\n\n<p>We have helped multiple public sector customers to implement zero trust by introducing IdP\/IAM-solutions established with a best of breed-approach. This has included establishing secure API-management and streamlining authentication procedures for applications and webservices. Other services have included providing efficient procedures for how attributes from business systems can be used in authorisation decisions support the management of complex distributed user catalogues.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"261\" height=\"261\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-chat.png\" alt=\"\" class=\"wp-image-29420\" style=\"width:100px;height:100px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-chat.png 261w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-chat-150x150.png 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-chat-50x50.png 50w\" sizes=\"(max-width: 261px) 100vw, 261px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-telemarketing-nbsp\"><strong>Telemarketing<\/strong>&nbsp;<\/h4>\n\n\n\n<p>We helped a client to repackage existing services for reuse in online services. They had to secure and harden internal services to make them publicly available for self-service portals, enabling the customer to give end-users access to data and APIs. We provided insights and knowledge on how to organize the Identity and Access Management team (IAM) and which tools to use to provide fine-grained security.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"261\" height=\"261\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-power-1.png\" alt=\"\" class=\"wp-image-29421\" style=\"width:100px;height:100px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-power-1.png 261w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-power-1-150x150.png 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/12\/icon-blue-power-1-50x50.png 50w\" sizes=\"(max-width: 261px) 100vw, 261px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-power-and-utility\"><strong>Power and Utility<\/strong><\/h4>\n\n\n\n<p>We built a layer of identity and access control in a customer-facing digital service to provide smooth login while protecting user data. The service made previously unavailable data available via an API Manager to support new customer-centric services including real-time energy consumption and power outage information.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"contact-us\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg\" alt=\"\" class=\"wp-image-28264\" style=\"width:170px;height:170px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg 340w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-300x300.jpg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-150x150.jpg 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-50x50.jpg 50w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-anders-essner\">Anders Essner<\/h3>\n\n\n\n<p>Phone: +46 (70) 513 56 19<br>anders.essner(at)ductus.se<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-d-mocha-light-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-medium\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-ductus-blue-color has-text-color\" id=\"h-other-interesting-reads\">Other interesting reads<\/h2>\n\n\n\n<section id=\"post-grid-block_60bfb3b5b2ef456af328ee1cf4f2d2ed\" class=\"post-grid aligncenter template-0\">\n\t<div class=\"inner-grid columns-3\">\n\t\t\n\t\t\t\t\n\n<div class=\"grid-item cases \">\n\t<a href=\"https:\/\/ductus.global\/sv\/cases\/identity-as-a-service-automatiserade-den-digitala-bankens-autentiseringstjanst\/\" class=\"block-link\" title=\"Identity as a Service automatiserade den digitala bankens autentiseringstj\u00e4nst\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2021\/09\/caas.jpeg\" alt=\"Identity as a Service automatiserade den digitala bankens autentiseringstj\u00e4nst\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Case Study <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">Identity as a Service automatiserade den digitala bankens autentiseringstj\u00e4nst<\/span>\n\t\t\t<p class=\"item-text\">En digital bank ville ha expertst\u00f6d till sin identifieringsfunktion fr\u00e5n en betrodd leverant\u00f6r som kunde leverera&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\n\n<div class=\"grid-item post \">\n\t<a href=\"https:\/\/ductus.global\/sv\/helping-banks-meet-psd2-and-the-continued-implementation-of-open-banking-regulations\/\" class=\"block-link\" title=\"Helping banks meet PSD2 and the continued implementation of open banking regulations\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2017\/12\/back-7.jpg\" alt=\"Helping banks meet PSD2 and the continued implementation of open banking regulations\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Insight <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">Helping banks meet PSD2 and the continued implementation of open banking regulations<\/span>\n\t\t\t<p class=\"item-text\">With the introduction of Payment Services Directive Two (PSD2) regulations, banks were forced to reassess their&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\n\n<div class=\"grid-item cases \">\n\t<a href=\"https:\/\/ductus.global\/sv\/cases\/starkt-identitets-och-atkomsthantering-hos-svensk-myndighet\/\" class=\"block-link\" title=\"St\u00e4rkt identitets- och \u00e5tkomsthantering hos svensk myndighet\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/11\/access-preview-718x441.png\" alt=\"St\u00e4rkt identitets- och \u00e5tkomsthantering hos svensk myndighet\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Case Study <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">St\u00e4rkt identitets- och \u00e5tkomsthantering hos svensk myndighet<\/span>\n\t\t\t<p class=\"item-text\">N\u00e4r striktare krav p\u00e5 datas\u00e4kerhet och efterlevnad blev verklighet valde en svensk myndighet att samarbeta med&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\n\n<div class=\"grid-item post \">\n\t<a href=\"https:\/\/ductus.global\/sv\/one-secure-organization-centralized-iam-as-the-foundation-for-physical-and-digital-security\/\" class=\"block-link\" title=\"One Secure Organization \u2013 Centralized IAM as the Foundation for Physical and Digital Security\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/06\/network-concept-purple-836x441.jpg\" alt=\"One Secure Organization \u2013 Centralized IAM as the Foundation for Physical and Digital Security\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Insight <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">One Secure Organization \u2013 Centralized IAM as the Foundation for Physical and Digital Security<\/span>\n\t\t\t<p class=\"item-text\">For many organizations, the realms of physical and virtual IT security are merging as companies look to digitalize more&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\n\n<div class=\"grid-item post \">\n\t<a href=\"https:\/\/ductus.global\/sv\/maintenance-the-vital-defense-longtail-of-any-iam-solution\/\" class=\"block-link\" title=\"Maintenance \u2013 the vital defense longtail of any IAM solution\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-784x441.jpg\" alt=\"Maintenance \u2013 the vital defense longtail of any IAM solution\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Article <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">Maintenance \u2013 the vital defense longtail of any IAM solution<\/span>\n\t\t\t<p class=\"item-text\">Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\n\n<div class=\"grid-item events \">\n\t<a href=\"https:\/\/ductus.global\/sv\/events\/managing-identities-and-app-security-consistently-in-a-complex-it-environment\/\" class=\"block-link\" title=\"Managing Identities and App Security Consistently in a Complex IT Environment\">\n        \t\t<figura class=\"grid-item-image\">\n            <img decoding=\"async\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2021\/10\/back-tech-836x441.jpg\" alt=\"Managing Identities and App Security Consistently in a Complex IT Environment\">\n        <\/figura>\n                        <span class=\"date-info \"  style=\"color:\"><span class=\"category-name last-cat\">Webinar <\/span><\/span>\n        \t\t<div class=\"inner\">\n\t\t\t<span class=\"item-title alt-heading-font\">Managing Identities and App Security Consistently in a Complex IT Environment<\/span>\n\t\t\t<p class=\"item-text\">Many large organizations face a major security challenge due to the many and varied authentication and authorization&#8230;<\/p>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t<\/section>\n\n\n\n<div style=\"height:150px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The threat of cyber attacks has increased dramatically in recent years as more services go online. Software today must address identity and authentication, access control (authorization), confidentiality, and integrity at every level to minimize the risk and damage that could be caused by a security breach. It&#8217;s imperative that you secure your digital services. We [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":28376,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4264,4164],"tags":[],"class_list":["post-9389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-consulting","category-offerings"],"acf":[],"_links":{"self":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/9389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/comments?post=9389"}],"version-history":[{"count":7,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/9389\/revisions"}],"predecessor-version":[{"id":32982,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/9389\/revisions\/32982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media\/28376"}],"wp:attachment":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media?parent=9389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/categories?post=9389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/tags?post=9389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}