Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Discover Silent Identity and Access Management

Discover Silent Identity and Access Management

Post Image

Discover Silent Identity and Access Management There’s no doubt that today’s identity and access management (IAM) programs are under pressure. Invisible forces both inside and outside the enterprise, such as the growing API economy, the explosion of smart devices, the move toward multicloud infrastructure and increasing regulatory compliance, are putting enormous weight on IAM, prompting […]

Post Tagged with
Read More

Idaho State University to Outsource Identity & Access Management to Fischer International Identity

Post Image

Idaho State University to Outsource Identity & Access Management to Fischer International Identity Fischer International Identity announced today that Idaho State University, a premiere research and teaching institution, has awarded Fischer the contract to manage university-wide identity security requirements in Fischer’s Identity as a Service® Cloud. Read more at – Idaho State University to Outsource […]

Read More

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification

Post Image

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification SailPoint Technologies Holdings, Inc., the leader in enterprise identity governance, today announced it has completed two information security assessments for IdentityNowTM, SailPoint’s SaaS-based identity solution. SailPoint successfully completed an ISO/IEC 27001:2013 certification and obtained a SOC 2® Type 2 report with an unqualified opinion for IdentityNow controls relative to […]

Post Tagged with , ,
Read More

Entersekt Partners With ForgeRock

Post Image

Entersekt Partners With ForgeRock Entersekt, a pioneer in mobile-first authentication and e-commerce enablement, announced today that it has joined the ForgeRock Trust Network as a principal technology partner. ForgeRock is a leading provider of identity and access management solutions to a wide range of industries, including financial services, retail, healthcare, higher education, and communications, in […]

Post Tagged with ,
Read More

One Identity Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location

Post Image

One Identity Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location. Read more at – One Identity Password […]

Post Tagged with , ,
Read More

Microsoft, the ID2020 Alliance, universal digital identification and you

Post Image

Microsoft, the ID2020 Alliance, universal digital identification and you Last year Microsoft joined ID2020, a global Alliance whose goal is to create universal digital identities for everyone. What are the social, economic and ethical implications of such an initiative? Our digital activity increasingly parallels our real-world activity. Participation in the modern economy, the ability to […]

Read More

Optimal IdM Announces Customer Support for GDPR

Post Image

Mistaken Identity: Clear Eyes, Full Data, Can’t Lose Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR). Taking effect in May of 2018, GDPR will require global organizations to control, process and protect […]

Post Tagged with ,
Read More

Sailpoint Audio Conference: Mistaken Identity: Clear Eyes, Full Data, Can’t Lose

Post Image

Sailpoint Audio Conference: Mistaken Identity: Clear Eyes, Full Data, Can’t Lose Ok, so you have the largest data lake in the hemisphere, but now what do you do with it? David Lee and Mike Kiser welcome Gianni Aiello to explore how big data can be triaged even while the first few rounds of analytics begin […]

Post Tagged with ,
Read More

Improving Cybersecurity: 12 Tools and Approaches Your Business Can Use

Post Image

Improving Cybersecurity: 12 Tools and Approaches Your Business Can Use As 2018 gets moving, cybersecurity remains at the front of many business leaders’ minds. Data breaches are a constant threat to your organization’s customer data, which means organizations must remain vigilant in their attempts to prevent a cyberattack from breaking through or causing damage. As […]

Post Tagged with
Read More

Easy IAM security best practices for a more secure AWS Cloud

Post Image

Easy IAM security best practices for a more secure AWS Cloud The focus of this article is on how you can do a couple of simple tasks that will bolster IAM security, which you can apply to your AWS cloud. Some of these actions are: – Removing the root access keys – Using users and […]

Post Tagged with ,
Read More