Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

Kantara Initiative grants Accreditation to Deloitte & Touche LLP, and, eValid8, and Approves Verizons Universal Identity Service at LoA3

ntara Initiative announces the accreditation of two assessors, Deloitte & Touche LLP [1] and eValid8 [2], who are now qualified to perform assessments for the Kantara Identity Assurance Framework for both the Identity Credential and Access Management (ICAM) and non-ICAM Trust Frameworks.Read more here…

Read More

Courion outpaces market with 30 percent growth and launch of industry leading products for identity and access management

On the heels of a re-defining product launch designed to disrupt the traditional identity and access management (IAM) product market, Courion Corporation, the leader in identity and access management for access risk, today announced results for Q3 2011. Read more here…

Read More

Q & A From Webcast to Asia on Platform vs. Point Solutions

Review the answers provided after the Webcast from Aberdeen. Read more here…

Read More

Implementing Identity Management in the Cloud

Effective Identity Management needs a very high level of commitment from the corporates and needs dedicated resources to get this accomplished. Read more here…

Post Tagged with , , , ,
Read More

Avoid an Identity Crisis: IBM Tivoli Bolsters Cloud Security

IBM Tivoli Federated Identity Manager: Centralized authorization, leveraged many ways.One of the great strengths of the IBM Tivoli service management portfolio is its versatility. As new architectures and new service delivery platforms emerge, Tivoli solutions that an organization already trusts and uses every day can often be applied to them as well. Read more here…

Post Tagged with , , , , ,
Read More

SIA announces OSDP project

The Security Industry Association this week announced its new Open Supervised Device Protocol with Data Security Extension project to help develop a standard communications protocol for interfacing peripheral identity and access control devices with control panels and other security management systems. Read more here…

Read More

Top 10 Access Control Trends

Check what is the opinion of Tam Hulusi, Senior Vice President, Strategic Innovation & Intellectual Property, HID Global for the Top 10 Access Control Trends. Read all article here… The move to mobility. The convergence of physical and logical access. Federal mandates that fuel more robust personal identification security. The need for sustainable solutions. The […]

Post Tagged with , , , ,
Read More

Symplified and GCA Technology Services Partner on Cloud Security

Symplified(R), the Cloud security company, announced that it has partnered with GCA Technology Services, a technology services provider with deep expertise in planning and implementing identity management solutions. Read more here…

Read More

ISF publishes guide on risk-free Federated Identity & Access Management

The Information Security Forum (ISF) has published a new report on Federated Identity and Access Management that describes the methodology that IT security professionals need to adopt when implementing the technology into their systems. Read here…

Read More

Forefront Identity Manager 2010 R2 Release Candidate (RC) now available

Forefront Identity Manager (FIM) 2010 R2 Release Candidate (RC) is now available from Microsoft Connect. The release candidate of FIM 2010 R2 contains new and improved features and functionality. See Details Here

Read More