28 April 2017 - Actualités
Memority, henceforth certified by Microsoft, to accelerate the Office 365 deployments

Memority got the Office 365 IDP Certification. 

Memority is a certified and qualified third-party identity provider to ensure the interoperability with O365. Memority met a large list of technical and functional requirements and is recognized as a trustable and secured solution for Office 365 federation projects. This certification is a further proof of the quality Memority delivers to ease O365 deployments with a full support of Memority certified service by Microsoft.


02 December 2016 - Actualités
IDaaS and DDOS

Using an IDaaS solution as an Access management and SSO solution helps you in your digital transformation. The extended enterprise, the use of the Cloud, the mobility, the smartdevices are so many subjects that an IDaaS needs to carry in terms of access while continuing giving to everyone the on-premise access. The IDaaS must serve the hybrid IS and not only the Cloud. That also means that you need to trust your IDaaS, because no IDaaS means no access... More particularly you need to ensure that the proposed disponibility is maximum and higher than what you could build at a reasonable cost.


Memority, the french IDaaS propose a service distributed on two data centers located in France in mode active/active with a very high level of security. To do so, we rely on our own security services, the security services of our host and third-parties security services. The news show that one of the most simple and violent attacks are the DDOS attacks. Last September, our host OVH went through the most important DDOS attack ever (more than 1 Tbps/s).


Most of the websites or companies would have fallen and had difficulties to restart. OVH (and so Memority) didn’t suffer from latency or any lost of disponibility relative to this attack. We have decided to choose OVH because it’s Dedicated Cloud solution (physical host dedicated to Memority and so not shared with OVH’s other clients) because OVH offers one of the most performing anti-DDOS protection on the market. The attack that was realised was perpetrated by the hijacking of 145 000 IPs cameras, in order to constitute a huge botnet and attack OVH. The mitigations services based on VAC in several layers of material allowed to hijack all the illegal traffic and allow the legal traffic. This attack has demonstrated the resilience level of our platform.


Nevertheless with the multiplicity of the DDOS attacks, especially from the hijacking of connected objects, the subject of the DDOS attacks remain a worrying subject because that might paralyse the whole digital economy. Beyond the mitigations services implemented, it is necessary to realize that it is important to securise this connected objects. In particularly, the hijacking of the IPs cameras was realised by penetrating those cameras by forcing the credentials access to them. Memority allows to secure the access to the connected objects, to link them to human identities (MRI, Identity relationship management) and authenticate / authorise the access from those devices to the IS. There is an urgent need for a collective awareness of the security of connected objects in a large scale.


For the companies turning to digital, DDOS attacks and the hijacking of connected objects become major risks. Building your own IAM internally require to accompany it with expensive security measures : DDOS mitigation, SIEM, vulnerability management, DRP…

For Memority, the digital trust is not an option. All the security services of our IDaaS are included in the subscription and are verifiable.


1- Last October 19, the american host Dyn went through a massive DDOS attack on its DNS servers, making unusable websites such as Twitter, Spotify, AirBnb… The company could not stop the attack and posted various contradictory informations on this attack : 500 000 connected objects then tens of millions ones. The company did not mentioned the size of the bandwidth used for his attack. Nothing suggests that it was really bigger than the one involving OVH. On the Contrary, it questions on the DDOS mitigations capacities of a such hosting company.


06 March 2015 - Actualités
Identity, the new firewall against data breaches

Another Data Breach, another Dollar lost

March 2015, 50,000 Uber driver names, license numbers are exposed in a major data breach. Unfortunately, Uber is joining the list of countless examples of companies such as Sony, Kmart, JP Morgan, where access management has gone wrong over the past years.
Those data breaches keep on costing those companies millions of dollars. Direct and indirect costs: According
​ to​ IBM's 2014 Cost of Data Breach Study: Global Analysis, those costs include direct and indirect expenses. "Direct expenses include engaging forensic experts, outsourcing hotline support and providing free credit monitoring subscriptions and discounts for future products and services. Indirect costs include inhouse investigations and communication, as well as the extrapolated value of customer loss resulting from turnover or diminished customer acquisition rates."
In a recent post, we stated that companies must now embed careful stewardship of data in their value proposition to their customers, employees and partners in order to gain a competitive advantage: Trust. Nevertheless, that does not explain why this increasing resurgence of data breaches.

Reborn Identity management: IdaaS

A key explanation might lie on digital breakthroughs: Cloud, mobility, smart and connected products. In the ancient world, companies controlled all their on-premise systems, in which everybody had a username and a password to pass secured front-doors. Companies are now realizing that their employees bring their own devices, use their laptop from home and access cloud applications: assets are no longer under the control of the enterprise.
The traditional Identity and Access Management (IAM) solutions which managed secure access are no longer able to cope with. In turn, Identity-as-a-Service (IdaaS) solutions appear to manage access to cloud and mobile applications with authentication, SSO and account management features. Their automated account provisioning and deprovisioning features help with avoiding orphaned and active accounts on Cloud or mobile that can leave enterprises attractive targets for hackers.

How to source IdaaS providers?

But how to source the right IdaaS solution? We believe our customers should choose according key value attributes.
•Use case coverage: Does the solution provide multi-platform access management services for enterprise employees, partners and customers ? Does the solution enable the company to manage access to Cloud, mobile and on-premise applications?
•Faster time to value: Does the solution reduce the talent costs to implement the identity management solution? In other words, to what extent does the delivery model enables to boost deployment delays in comparison to IAM on-premise projects?
•Total Cost of Ownership: To what extent does the solution reduce Total Costs of Ownership of an Identity Management solution, including software and implementation costs, ongoing maintenance, patch and upgrade costs, etc.?
•Security. What about IT security and data residency? How does the provider however ensure service resilience and business continuity ?
Memority is a security portal accessible from any kind of device which manages digital Identity for employees, partners, clients or machines. It’s the first SaaS suite solution which answers to Cloud, mobility and IoT security challenge
Memority is a spin-off from Arismore, leader since 2002 on Identity & Access Management consultancy and service market. Memority innovates and sets new criteria on IAM marketplace in order to answer to growing demand for digital trust as an enabler of digital strategy of all Enterprises
To get further information, please visit us at memority.com
21 January 2015 - Convictions
How IoT disrupts Identity Management

Smart and connected products' users become more aware of the value of their data. They want to actively participate in decisions about how data is collected and used. Therefore companies, which, truly need to collect data in order to drive value with connected products, need to lock down a clear value proposition on careful data stewardship in their business model. Disruptive Identity Management Services are the key to help companies to crack that business case in the Internet of Things.

To unlock value of data, leave consumers a say in data usage

Early 2014, in its brilliant study, Data Privacy by the numbers , BCG delivered some key insights about data privacy. In developed countries, whether they are French or American, consumers do not want some credit rating service to hold a complete picture of their life. This mostly concerns information about health/genetic information, children and spouse information and financial data. More interestingly, the study shows that if 75% of consumers were given simple tools to control the use of their data, they would use it and it would generate access to consumer data by at least five times. BCG calls this opportunity the trust advantage. According to World Economic forum, it is $500 billion worth opportunity in the G20 by 2016. Yet, not so many companies, outside highly regulated markets, have seized this opportunity, considering data privacy an externality or a risk to be run.

Connected products must embed stewardship of data in their value proposition

But, here comes the age of smart and connected products, which will get companies to give customers tools to control the use of their data. According to Michael Porter, smart and connected products increase the bargaining power to buyers: "As Buyers become more aware of the value that data generates across the value chain, they will become more active and demanding participants in decisions about what data is collected". Even if today most connected products provide buyers and users zero-constraint “click through” agreements on data usage, we expect to see companies providing "new contractual frameworks and mechanisms", just as insurance companies do with drivers willing to share data on their driving habits against lower premiums or fees.

How build a claim to data, when products self-coordinate and self-enhance?

However, because of the increasingly capacity of connected devices, embedding careful stewardship of data in a value proposition is becoming even more complex. Indeed, competition will soon shift from discrete connected objects to "systems of systems, arrays of autonomous products and services". Therefore, the new value proposition on careful data stewardship should answer 2 questions: In a space where autonomous products self-coordinate, self-communicate, self-diagnose, self-enhance, how can smart products' buyers and users decide on their participation about how data is collected and used ? How to prevent data breaches?

Identity Management services are the solution but they need to be disrupted

Identity management platforms have a key role to play since they include the key ingredients to meet those challenges: Identity management lifecycle, authentication and authorization services. However, those user-related IdM services are to be disrupted: IoT-based IdM now manages relationships between products and users, whose lifecycles differ. Authentication becomes seamlessness and context-based. Authorization services also need to turn their "claim-to-application" approach into a "claim-to-data" approach, where different users or devices decide the appropriate method to collect and share data with third-parties.

Memority is a disruptive Cloud-based Identity Management Service, which manages the access of employees, consumers, partners and connected things to Cloud and on-premise web applications. Visit us on Memority.com

05 December 2014 - Convictions
5 reasons why CFOs should have a deeper look at Memority
Memority is an IdaaS. What's an IdaaS? IdaaS stands for Identity as-a-Service. It consists of a cloud-based service which enables companies to manage access of their employees, partners and customers to Cloud and on-premise web applications. Yet, SaaS is one those buzz words which rings in the ears of CFOs every day. So, why CFOs should pay particular attention to Memority? There are 5 reasons:
1. Scale. First at all, without IdaaS you cannot securely scale your business. As Clint Eastwood would say, "in the digital world, there are two kinds of companies: Those which scale their business with IdaaS and those which let architecture slows them down extending their IT. Most companies have already invested money in enterprise-grade user directories. Turnkey IdaaS solutions, such as Memority, leverage those directories and enable companies to extend their IT to partners, customers or newly acquired subsidiaries in a few clicks with high agility.
2. MOOSE. Cloud Investments are reconfiguring CFOs' IT Budgets, which shift from new project spending to ongoing Maintain and Operate the Organization, Systems, and Equipment (MOOSE) expenditures. According to Forrester analyst Andrew Barrels, CFOs and CIOs need to focus more  on sourcing and vendor management to keep their MOOSE budgets under control. Take Office 365 and its complex licensing model. Memority helps control Office 365 license costs by provisioning or de-provisioning access of people to Yammer, Sharepoint, Lync or Exchange in real-time. Now, imagine your company managing all its SaaS licenses in a single tool.
3. Shadow IT. According to Frost & Sullivan, 35% of IT spending is under the radar of CIOs. Not only the high penetration rate of shadow IT impacts the security posture of CIOs, but it also leaves room for CFOs to streamline useless and hidden expenditures. Should the company waste money in 3 cloud-based ERPs or 4 SaaS CRM solutions? With Memority, it's time for CFOs and CIOs to be part of an epic battle against shadow IT. Indeed, Memority supplies company's people with a unique front door: This access portal lets employees to choose their apps while CFOs and CIOs monitors which IT services they consume.
4. EBITDAR. Most companies with a high debt-to-equity ratio try to boost their EBITDAR, in order to prepare exits or leverage debt. High on-going fees asked by SaaS solutions in comparison to low maintenance and operating costs from on-premise software would reduce the EBITDAR and discourage CFOs from buying SaaS solutions. There is something really specific to Memority; on-going fees appear to be five time lower than maintenance and operating costs required by on-premise competitors.
5. Assets. Any companies with positive cash flows seek for investment opportunities. Since digital identity has become a key ingredient for digital transformation, those companies could legitimately ask whether identity or not is a worthy asset for investment?  The answer is definitely positive. But how? By building an enterprise-grade identity management service from scratch, by buying an Identity and Access Governance software or by partnering up with specialized providers? Identity Management is really capital intensive, with almost uncertain cash flow and hidden costs.  CFOs will hardly find a way to calculate their NPV on identity. Therefore, building or buying identity management services are not worth it. The last option should be to establish a partnership with IdaaS provider. Of course, IdaaS is not an investment from a financial standpoint. However, IdaaS, such as Memority, helps companies  to pay off their subscription fees by saving money on helpdesk costs and productivity gains
17 November 2014 - Convictions
In the age of access, digital identity is the key

Just-in-time access to personalized goods and services

According to the visionary author Jeremy Rifkin, the new economy is being reshaped by digitalization and now relies on just-in-time access, to personalized goods /services and resource sharing. At the age of access, access is more valuable and important than private property. Content and service providers, and multi-sided business models have now a fast online development. These new services and business are giving us a large choice of leased products and customizable experiences. From the largest companies to the smallest one, online service and good providers always face the same 3 questions while managing online access of their consumers:

  • How to reach connected consumers such as Emma or Tom?
  • What does my company need to do confirm Emma's identity online? How can I obtain the Emma’s trust?
  • How to provide just-in-time personalized access to value-added content to Emma because she's Emma?

Identity is the key to connected consumer access management

At Memority, we strongly believe that the answer to these three question is all about, Digital identity. At the age of access, identity is the key for trustworthy online interactions and content. These 4 following cases submit the idea of “Digital Identity”.

  • Customer Relationship Management: Connect, collect and convert online consumer’s data by using their social identities and their identity profiles, by respecting at the same time their social privacy.
  • Vendor Relationship Management: Rather than having organizations collecting, analyzing and targeting consumers data, individuals are now in control of their data and give their permissions to share and access it.  
  • Children's Online Privacy Protection: Identity for children and family designed for content and service provider for the youth market. Those services enable content providers to legitimately engage with children while making parental verification easy and scalable.
  • Employed-issued identity: Enable consumers to use their employer-issued MFA credential to be able to log in to their banking or insurance accounts.

Memority provides services to manage consumer identity and access

In the age of access, business cases for consumer access management can be really different. Same for architectures, IT platforms on which providers operate them. Therefore, Memority has designed a complete set of services in order to help businesses to manage online access for their consumers. These services can be easily adjustable to securely connect your digital touch-points with connected consumers online thanks to registration, authentication and federation services:

  • Registration-as-a service: Enable consumers to create and manage their account
  • Social login: Enable consumers to log in to the digital touch-points with their social identity
  • Identity Federation: Enable consumers and partners to log in to their own Identity Provider
  • Multi-factor authentication: Reinforce authentication by using OTP mechanisms on mobile
  • Cloud directory: Store Consumer profiles in a secure directory
  • Analytics: Control and Monitor in real-time who is accessing what
  • Real-time synchronization: Provide or discard Just-in-time personalized services
  • Single Sign-On: Provide unique authentication to end-users.