Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

About Aidy

Identity and access manager subject matter expert

Dell To Acquire Quest Software

Dell and Quest Software today announced they have entered into a definitive agreement for Dell to acquire Quest, an award-winning IT management software provider offering a broad selection of solutions that solve the most common and most challenging IT problems. Dell recently announced the formation of its Software Group to build upon its existing software […]

Read More

Identity and Access Management: Filling the Gap in Identity and Access Governance

We’ve entered the age of access governance. Organizations need to know who has access to what data and how they were granted that access. Identity and Access Governance (IAG) solutions address these issues while managing enterprise access. They provide visibility into access, policy and role management, and risk assessment—and they facilitate periodic entitlement reviews of […]

Read More

RSA Achieves Leading Market Share for Identity and Access Management According to Analyst Firm

The Security Division of EMC (NYSE: EMC) has been named the worldwide leader in total revenue among identity and access management vendors, according to the latest IDC Worldwide Identity and Access Management (IAM) 2011 Vendor Shares report. According to IDC, the IAM software market showed a significant economic recovery, and specifically in 2011, the market […]

Read More

Creating a Custom Adapter in OIM 11g

Identity Management Technical Details

Check the next blog and learn about how to Create a Custom Adapter in OIM 11. The purpose of this entry is to explain how to create a custom adapter in OIM. The adapter will write to an external file. This functionality could easily be changed to modify a database or some other process. We […]

Read More

Gartner Predicts Cloud IAM Will Grow 500 Percent by 2015

At a recent summit, Gartner analysts made strong assertions about cloud-based IAM’s growing predominance, predicting that cloud IAM will grow 500 percent from 2012 to 2015. In addition, they predict that IDaaS will account for 25 percent of all IAM sales by 2014 (today, IDaaS makes up less than 5 percent of IAM sales). Why […]

Read More

Introducing Identity Management 11g R2 Webcast

Please join Oracle and customer executives for the launch of Oracle Identity Management 11g R2, the breakthrough technology that dramatically expands the reach of identity management to cloud and mobile environments. Until now, businesses have been forced to piece together different kinds of technology to get comprehensive identity protection. The latest release of Oracle Identity […]

Read More

Enterasys Partners with immixGroup to Deliver OneFabric Solutions to the Public Sector

Enterasys Networks, a Siemens Enterprise Communications Company, today announced its partnership with immixGroup, reinforcing its commitment to the public sector. immixGroup enables technology companies to easily conduct business with the federal government, and will provide distribution services to Enterasys and its channel of public sector resellers and solution providers. A holder of key GSA contracts, […]

Read More

BT Selects Cyber-Ark to Secure and Monitor Privileged Accounts

Cyber-Ark® Software, the leading global information security provider for protecting and managing critical applications, identities and sensitive information, today announced that BT, one of the world’s leading communications services companies, has deployed the Cyber-Ark Privileged Identity Management Suite to monitor and secure its privileged accounts. BT also plans to integrate the Cyber-Ark Suite into its […]

Read More

Implementing Challenge Questions – ( Part 1 )

Identity and Access Management Articles

One of the key component for a web application and for and Identity and Access Manager System is the implementation of a Challenge Questions, also known as security questions. Challenge questions reduce support costs by allowing users to retrieve their password rather than contacting support. The challenge questions are used to improve the security of […]

Read More

Manage Identity and Access to All Your External SaaS Apps from Salesforce

A Free webinar “Manage Identity and Access to All Your External SaaS Apps from Salesforce” with Pat Patterson of See the free webminar below.

Read More