Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

The Experts Conference for Directory & Identity

Join Quest for the 11th annual TEC for Directory & Identity! Conference founder, Gil Kirkpatrick, shares the stage with the leading Active Directory and Identity and Access authorities and MVP’s from around the world. 400-level training sessions designed to share industry predictions, technical tips and tricks, and advanced education make TEC for Directory & Identity […]

Read More

IdentityForge Supported Adapters for ForgeRock’s OpenIDM & OpenAM

The IdentityForge Advanced Adapter Suites are tightly integrated with the ForgeRock product suites OpenIDM and OpenAM through the ForgeRock IDM ICF LDAP Adapter. The ForgeRock LDAP Adapter works with the Advanced Adapter Suites providing ForgeRock customers with an “out of the box” solution for IBM-RACF, IBM-iSeries, HP OpenVMS, SAP ERP Central Component, Solaris, CA-ACF2, CA-Top […]

Read More

IAM: back together, but disliked by users?

Last year, the Jericho Forum message was that IAM should be separated. That is not to say that IAM isn’t a factor within security. As someone said to me on Twitter: “Surely IAM is an integral part of information security.” This year’s IAM summit did go some way to addressing the security element in IAM. […]

Read More

Executive Director of Open Security Exchange to present Government Security Conference & Expo

Ron Martin, CPP, Executive Director, Open Security Exchange will be a featured speaker at GovSec – the Government Security Conference & Expo featuring the U.S. Law Enforcement Conference & Expo. He will be presenting Maturity Model for Identity, Credentialing and Access Management at 3:15 pm on Tuesday, April 3, 2012. Read more here…

Read More

ALL-STATE LEGAL Integrating Vizibility’s QR Code and Online Identity Management Platform

ALL-STATE LEGAL announced today that 2nd quarter 2012, it will offer an integrated solution to seamlessly add QR codes to business cards. The first of its kind offering will also provide law firm-branded, personalized and optimized mobile microsites for each professional with complete tracking and data analytics. To deliver the innovative new service, ALL-STATE LEGAL […]

Read More

Best Practices for IAM Program Management and Governance

This research sets out Gartner’s recommendations for identity and access management (IAM) program management and governance, which typically build on and extend information security best practices in ways that address the more intimate relationship that IAM has with the business. Read more here …

Read More

SailPoint Extends Global Footprint, Adds Major European Companies to Its Customer Base

SailPoint, the leading provider of governance-based identity management solutions, continues its steady global expansion and has signed more than a dozen of Europe’s largest companies as customers in the last six months. SailPoint’s European customer base now includes prestigious companies such as: Aviva, Nordea, Rabobank International, Sanofi-Aventis Group, Société Générale, Swedbank, Tesco Bank and UBS, […]

Read More

GreyTower for Novell IDM Solution Set

The Grey Tower Solution set for Novell environments is based on being able to efficiently transfer Identity related information between the Novell eDirectory Service and an Enterprise Services Bus (ESB) integration services such as MuleESB. The GreyTower for Novell IDM Connector is an open source JMS (Connector) for Novell Identity Manager Service. The connector is […]

Read More

Identity Management at COLLABORATE 12

Bringing together Oracle Applications and Technology education, COLLABORATE 2012 is a forum designed and delivered by Oracle users. Produced by the three independent user groups, Independent Oracle Users Group (IOUG), Oracle Applications Users Group (OAUG) and Quest International Users Group (Quest), COLLABORATE offers keynotes, deep-dives, workshops and user-driven sessions spanning technology, application and cross solutions. […]

Read More

5 signs you’ve lost control over cloud apps

Here are a few of the most common signs that your identity and access management (IAM) solution isn’t working when it comes to your growing portfolio of cloud applications: 1. End users start sticking Post-It notes all over their computers listing user names and passwords for cloud-based applications. One solution to this problem: a single […]

Read More