Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

Evolution of identity and access management and privacy management in 2012

In its new report Gartner has listed the six major trends that will drive the evolution of corporate management of identity and access management (IAM) and privacy management in 2012. Bob Blakley, vice president and distinguished analyst at Gartner, said, “In 2012, businesses need to increase their focus on identity and privacy projects that can […]

Read More

Identive Group appoints John Menzel VP of Access Control ID Solutions

Identive Group, Inc., a provider of products, services and solutions for the identification, security and RFID industries, announced that it has formed a new product group focused on addressing the growing need for standards-based, integrated access control from the door to the network. The new Converged Access group aims to build on innovative technology specially […]

Read More

Oracle Named a Leader in Identity Management by Leading Analyst Firm

The first-ever Gartner, Inc. “Magic Quadrant for Identity and AccessGovernance” recognizes Oracle as a leader, Oracle announced today. Oracle also announced today that Oracle is placed in the Leaders Quadrant of the 2011 “Magic Quadrant for User Administration/Provisioning.Read more…

Post Tagged with , , , ,
Read More

Syntegrity Networks shines as a NA market leader in ForgeRock resale and delivery.

After a resounding end to 2011 during which Syntegrity Networks positioned itself as a market leader in the resale and delivery of ForgeRock products in North America, the company is poised to make an even bigger mark on the ForgeRock landscape in 2012. Syntegrity Networks is an internationally recognized consulting firm solely focused on ForgeRock’s […]

Read More

Ping Identity Kicks Off Free Cloud Identity Security Training Series

The Cloud Identity Security Leader™, today announced that its 2012 Free Online Training is underway. Ping Identity provides a wealth of free educational information on its website for those interested in learning about cloud identity standards, use cases, technical “how tos” and best practices for using proven solutions from the Cloud Identity Security leader. Since […]

Read More

Role-based encryption from SECUDE provides data protection for enterprises

SECUDE has released a new version of SecureFolder Enterprise, which offers enhanced functionalities together with an optimized look and feel. The architecture provides standard interfaces for easy integration into identity management systems. SecureFolder Enterprise is an enterprise-grade solution for role-based encryption of folders and provides protection against unauthorized access and data loss. Read more here…

Read More

Webcast Q&A : Building a Secure Cloud with Identity Management

Read the captured the Q&A from the webcast for informational purposes and check the presentation for the Building a Secure Cloud with Identity Management. Read more here…

Read More

Things to set when you install Novell Designer for Identity Manager.

One of NetIQ’s (Novell’s) Identity Manager product major strengths is the tool used to manage the solutions. Designer for Identity Manager. If you are using IDM and are not familiar with Designer, stop, go get it, and start using it. There is a lot you can do in iManager, but almost all of it can […]

Read More

Symplified Explain how to Secure the Cloud using Identities

Symplified Vice President to Explain how to Secure the Cloud using Identities at Cloud Expo Europe Cloud Identity Expert will Present Role of Identity and Access Management in Cloud Security. Read more here…

Read More

Radiant Logic Announces Federated Identity Service as a Complete Solution for Achieving the FICAM Roadmap

Radiant Logic, the market leader of identity virtualization solutions, today announced that the complete federated identity service delivered by its RadiantOne identity virtualization platform enables government agencies at every level to meet recently-mandated Federal Identity, Credential and Access Management (FICAM) requirements. As part of the guidelines, FICAM introduced the Authoritative Attribute Exchange Service (AAES) capability […]

Post Tagged with , , , ,
Read More