Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

BIO-key Releases Updates of its Biometric Authentication Software and Algorithms for Flexible Identity Services

BIO-key Releases Updates of its Biometric Authentication Software and Algorithms for Flexible Identity Services

Post Image

BIO-key Releases Updates of its Biometric Authentication Software and Algorithms for Flexible Identity Services BIO-key International, Inc., an innovative provider of biometric software and hardware solutions for strong and convenient user authentication, today released updates of its biometric service platform, WEB-key 4.0, and core biometric algorithm software, VST 6.6, offering enhanced capabilities, expanded scanner interoperability […]

Post Tagged with ,
Read More

CyberArk Named Top Privileged Account Security Solution for Government Agencies

Post Image

CyberArk Named Top Privileged Account Security Solution for Government Agencies CyberArk, the global leader in privileged account security, today announced it was named a 2017 Government Security News (GSN) Homeland Security Award winner in multiple categories for the second consecutive year. The CyberArk Privileged Account Security Solution is the platinum winner for “Best Physical Logical […]

Post Tagged with
Read More

One Identity Acquires Balabit to Bolster Privileged Access Management Solutions

Post Image

One Identity Acquires Balabit to Bolster Privileged Access Management Solutions One Identity, a Quest Software business and proven leader in helping organizations get identity and access management (IAM) right, today announced the acquisition of Balabit Corp., a leading provider of privileged access management (PAM), privileged account analytics and log management solutions that help businesses reduce […]

Post Tagged with , ,
Read More

Do You Need Identity Governance and Administration? 4 Questions to Ask Yourself

Post Image

Do You Need Identity Governance and Administration? 4 Questions to Ask Yourself Identity Management appears simple on the surface: make sure users are who they say they are, that they only have access to the data they need for their job, and remove permissions that employees (or ex-employees, as the case may be) shouldn’t have. […]

Post Tagged with
Read More

Build the Case for an Identity and Access Management Program

Post Image

Build the Case for an Identity and Access Management Program How a formal program management approach can help IAM and IT leaders accelerate adoption of IAM capabilities. No longer limited to security functions, identity and access management (IAM) has expanded its influence into new domains that include supply chain, consumer IAM (CIAM) and the Internet […]

Post Tagged with
Read More

Use caution with OAuth 2.0 protocol for enterprise logins

Post Image

Use caution with OAuth 2.0 protocol for enterprise logins The reason why authentication specifications, such as the OAuth 2.0 protocol, are such a vital information security control for maintaining secure logins is because it’s the first step in the process of authorization, allowing access rights to be granted based on who a user is. Authentication […]

Post Tagged with ,
Read More

Jeffrey W. Brown, CSIRO of BNY Mellon, Joins NoPassword Board of Advisory

Post Image

Jeffrey W. Brown, CSIRO of BNY Mellon, Joins NoPassword Board of Advisory NoPassword is proud to announce and welcome Jeffrey W. Brown as a new member of its board of advisory. Jeffrey is the Chief Information Risk Officer for Bank of New York Mellon Investment Management, one of the world’s leading asset management organizations with […]

Post Tagged with
Read More

Okta Inc (OKTA) Shares Bought by Bank of New York Mellon Corp

Post Image

Okta Inc (OKTA) Shares Bought by Bank of New York Mellon Corp Bank of New York Mellon Corp boosted its position in Okta Inc by 145.3% in the third quarter, according to its most recent filing with the Securities and Exchange Commission (SEC). The institutional investor owned 83,528 shares of the company’s stock after buying […]

Post Tagged with ,
Read More

How PIAM Is Creating New Opportunities for Installing Security Contractors

Post Image

How PIAM Is Creating New Opportunities for Installing Security Contractors A new class of security software products called physical identity and access management (PIAM) is transforming the way in which the enterprise security function supports critical processes. These products enable multiple departments and teams to engage and collaborate through on-boarding, badging and access management. The […]

Post Tagged with ,
Read More