Keycloak and SIEM Integration at Enterprise Scale

KeyCloak is one of the most widely adopted enterprise identity and access management (IAM) platforms today. At Inero Software, we work with Keycloak on a daily basis — delivering Keycloak deployment, integration, and consulting services for organizations that rely on it as a core security component. In one of our…

Voicebot Deployment in Call Centers: Key Considerations Beyond the Demo

Voicebot solutions are increasingly being adopted in call center operations as a way to reduce waiting times, lower operational costs, and improve service availability. In practice, however, successfully deploying a voice agent in a real-world business process requires far more than a properly functioning language model. From the INERO team’s…

Keycloak Deployment Auditing – General Scope and Guidelines

Keycloak Deployment Auditing – General Scope and Guidelines Practical lessons from auditing multi-realm, multi-client Keycloak environments in medium and large organizations  1. Introduction In medium and large enterprises, Keycloak deployments rarely follow a simple “one realm – one application” pattern. In reality, such environments typically consist of multiple realms reflecting…

Implementing an AI-Powered Telephony Service Center with ElevenLabs & LiveAPI

Implementing an AI-Powered Telephony Service Center with ElevenLabs & LiveAPI Over the past year, advancements in real-time AI models and high‑fidelity speech synthesis have accelerated the development of AI-driven telephony systems. At Inero, we’ve had the opportunity to integrate modern telephony solutions with LiveAPI technology and ElevenLabs’ voice engine to…

Secure Email Delivery in Keycloak 26.2 Using XOAUTH2

Secure Email Delivery in Keycloak 26.2 Using XOAUTH2 Email has been one of the oldest and most fundamental services on the internet, used for notifications, password resets, verifications, and more. Over time we’ve seen major improvements — encryption via TLS, then STARTTLS, and now many providers are moving away from…

Keycloak or SaaS IdP? A Tech Leader’s Guide to Making the Right IAM Choice

Introduction Shipping single sign‑on quickly is tempting. Stakeholders push for a smooth login experience, developers want to move on to core features, and security teams are eager to tick the “MFA enabled” box. The trouble is that identity and access management (IAM) decisions outlive launch days. Once you choose a…

Is Your Company Ready for New Technology? How to Evaluate Technological Readiness

In the publication “Intelligent Agents in AI Really Can Work Alone. Here’s How.” by Gartner, the authors predict that by 2028, 33% of business applications will use agentic artificial intelligence, compared to less than 1% in 2024. This development will enable autonomous decision-making for up to 15% of daily operational…

Chatbot, Agent or AI Assistant? Find Out Which Solution Is Best for Your Business

Artificial intelligence and Large Language Models are buzzwords heard in nearly every industry. Many companies are wondering how to use them safely and which solution will be the most effective. There are plenty of options—and they’re often hard to tell apart. In this article, we break them down in a clear and easy-to-understand way.