Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

American Red Cross chooses Courion’s Access Risk Management Suite as part of transition to cloud computing platform

Courion Corporation, the leader in identity and access management for access risk, today announced that the American Red Cross will use the Courion Access Risk Management Suite to streamline operations as part of an organization-wide transition to the Microsoft Office 365 cloud computing platform. The American Red Cross will use the Access Risk Management Suite […]

Read More

Hitachi ID Systems Showcases IAM Solutions at the Retail’s BIG Show 2012

The Retail’s BIG Show is the National Retail Federation’s annual industry event which will be held in New York City. The four-day convention offers unparalleled education, collegial networking and a colossal EXPO Hall that showcases the industry’s most innovative technologies and solutions. For two full days, January 16th and 17th, Hitachi ID Systems will showcase […]

Read More

IBM Attacks the Complexity of Security with Identity Intelligence

IBM recently announced a new identity intelligence breakthrough designed in IBM labs to provide corporations with a far more sophisticated approach to managing the information employees can access. An employee’s unauthorized access to client information can leave a firm vulnerable to security breaches and audits. Many companies juggle the administration of identifying, managing and approving […]

Read More

Customers Talk: 5 Identity Platform Webcasts You Can’t Miss

Oracle is proud to launch a series of webcasts where we’ll explore the diverse challenges that organizations are facing, and you can hear real customers speak to their specific business objectives and how they leveraged the Identity as a Platform approach to tackle those. In this 5-webcast series, you will hear first-hand from your peers […]

Read More

Minimum password length best practices: Are 14-character passwords necessary?

I’m hearing more and more security experts say passwords should be in excess of 14 characters in order to thwart brute-force password-hacking tools. However, this seems a lot to ask of most enterprises’ user populations. What’s your advice for character length of standard passwords? Read more here…

Read More

Federated identity management: Made for the cloud

The motivations for moving your business’ existing internal applications to the cloud, developing new applications in the cloud, or subscribing to cloud- based software as a service products are clear. But just in case you missed them, or this is the first paragraph about the cloud you’ve ever read, here’s a quick breakdown. Read more […]

Read More

FishNet Security Acquires Leading Information Security Firm

FishNet Security announced today it has acquired Logic Trends Inc., a leading information security provider of identity and access management solutions. Read more here…

Read More

A Case Study in Building a Secure Cloud with Identity Management

Security is the number one barrier to cloud adoption. Organizations that move applications into the cloud have to bridge the security gap between the enterprise and the cloud by providing user administration, application authorization, authentication and compliance reporting to restore control and address regulatory mandates. Read more here…

Read More

Eclipsys Sunrise Access Manager / Patient Financial Manager and Novell IDM

Health care systems have a lot of responsibility protecting and maintaining the information patients provide them. Throughout the years, many rules and policies have been set into place protecting patients’ information. Read more here…

Read More

Quest Software Quest One Identity Solution Review by SC Magazine

Quest One Identity Solution offers full-scale, full-service account provisioning and management. With this product, administrators can implement single sign-on, strong authentication, password and privileged account management, and user account provisioning all in one place. Read more here…

Read More