Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

Tivoli Federated Identity Manager Security Assertion Markup Language (SAML) message weak security

Tivoli Federated Identity Manager could provide weaker than expected security, caused by improper validation of SAML message signature elements.Read more here…

Read More

Gartner 2011 Magic Quadrant for IAG: Tight Competition in a Maturing Industry

Gartner has just released its first ever Magic Quadrant for Identity and Access Governance (IAG), and SailPoint appears to have emerged as a narrow victor. Unlike the Forrester Wave for IAG published earlier this year, which showed SailPoint and Aveksa leading the competition by a mile, Gartner has 4 of the 7 evaluated offerings in […]

Read More

Guide to better security for mobile access to networks

he National Institute of Standards and Technology has developed guidelines that address the growing use of remote access, setting standards to raise the security level for cell phones and other mobile devices used by government workers, contractors and citizens. Read more here…

Post Tagged with , , , ,
Read More

Lieberman Software’s Enterprise Random Password Manager Earns Editors’ Best Silver Security Award from Windows IT Pro

Lieberman Software Corporation’s flagship privileged identity management product, Enterprise Random Password Manager(TM) (ERPM), won the 2011 silver award for Editors’ Best Security Product from Penton Media’s Windows IT Pro. Read more here…

Read More

Comparing Oracle and NetIQ/Novell

Read the next Oracle white paper about Oracle vs NetIQ/Novell Identity Management products. Interviews by Crimson Consulting Read more here…

Read More

IBM’s Role-Based Identity Management: Access Control Made Agile

One of the most challenging aspects of IT security today is access governance—establishing which employees are authorized to access which resources, and with which privileges, then monitoring and updating those access privileges on an ongoing basis as workers come and go, or change job responsibilities. Read more here

Read More

Cloud Identity and Security Best Practice

As highlighted the Kantara initiative provides a best practices forum for Federated Identity security, and these can be used to build and offer ‘IDaaS’ – Identity as a Service. Read more here…

Post Tagged with , , , , ,
Read More

On creating an IAM governance body

Out of all the disciplines of IT security, identity and access management (IAM) is known for being notoriously complex — and for good reason. Read more here…

Read More

Quantum Secure’s SAFE software centralizes enterprise physical Identity and Access Management

Managing identity and credentialing of employees is a labor-intensive challenge for any enterprise. Making matters even more complex, many companies have multiple access control systems and disparate databases. Quantum Secure has developed SAFE enterprise software to solve these problems. Read more here…

Read More