Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

About Aidy

Identity and access manager subject matter expert

The Auto Club Group Enables Secure Digital Identity & Access Management for Members

Post Image

The Auto Club Group Enables Secure Digital Identity & Access Management for Members OpenText, the global leader in Enterprise Information Management (EIM), today announced that The Auto Club Group (ACG) – the second largest AAA club in North America – has selected OpenText to support a unified identity and access management solution for their 9 […]

Post Tagged with
Read More

Establishing Trust With Identity Governance Intelligence

Post Image

Establishing Trust With Identity Governance Intelligence Many organizations do not keep well-documented records of where all their data is housed. This is a serious problem with so many new regulations requiring companies to be more accountable for protecting information. Does your organization know exactly who its users are, what they’re entitled to access and where […]

Post Tagged with ,
Read More

Okta teams with SailPoint for joint identity management service

Post Image

Okta teams with SailPoint for joint identity management service SaaS identity providers Okta and SailPoint Technologies have inked a strategic partnership that aims to tackle access and identity governance problems for enterprises. Okta and SailPoint are often pitted as rivals, but the companies offer different solutions to the online identity management problem. Okta functions as […]

Post Tagged with , ,
Read More

Steps to a successful IAMG project

Post Image

Steps to a successful IAMG project It is becoming increasingly important that organisations constantly manage and control employee access to information and systems within the organisation. Philip Yazbek, industrial psychologist from consulting firm Bizmod, says that the responsibility of governing and protecting information and data lies with the organisation, and as such an identity access […]

Post Tagged with
Read More

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications

Post Image

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications The Kantara Initiative formally announced today the approval and publication of the User-Managed Access (UMA) Version 2.0 (UMA 2.0) technical specifications. UMA 2.0 offers significant enhancements to the established global standard bringing user consent, control and trust into easier reach for organizations processing personal data. UMA is […]

Post Tagged with ,
Read More

Microsoft is working on a decentralized Digital Identity system, using blockchain and Authenticator

Post Image

Microsoft is working on a decentralized Digital Identity system, using blockchain and Authenticator A couple of weeks ago, Microsoft announced that it was joining the ID2020 alliance, a global partnership working to create an open-source, blockchain-based digital identity system. This is all about providing a decentralized and reliable ID system to the billions of people […]

Post Tagged with ,
Read More

SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief, Bringing Identity Security Automation to the Channel

Post Image

SecureAuth and Core Security’s Larry Kraft Named 2018 Channel Chief, Bringing Identity Security Automation to the Channel SecureAuth and Core Security, the leader in identity security automation, today announced that CRN, a brand of The Channel Company, has named Larry Kraft, VP of Global Channels & Alliances, to its prestigious list of 2018 Channel Chiefs. […]

Read More

Startup Profile: Identity — manage customers’ logs and get realtime updates online

Post Image

Startup Profile: Identity — manage customers’ logs and get realtime updates online Identity is a cloud-based customers/visitors management software which aims to eradicate the use of paper logs in offices and promote electronic means. Launched on December 4, 2017, by Saheed Ajibulu (Team Lead) and Olagoke Okebukola (Chief Technical Officer), the web application helps visitors […]

Post Tagged with
Read More

How to configure and use Amazon’s free IAM service

Post Image

How to configure and use Amazon’s free IAM service Amazon Web Services has a built-in service that controls access to AWS resources. This service, called IAM (Identity and Access Management), allows administrators to control who, what, and where any given user can perform an action in a resource. The following list contains all the key […]

Post Tagged with , ,
Read More

Webinar: Protect Privileged Active Directory Credentials Using a Tiered-Administrative Model

Post Image

Webinar: Protect Privileged Active Directory Credentials Using a Tiered-Administrative Model In this webinar, Russell Smith will show you how to plan your Active Directory and manage access to domain controllers to minimize the risk of exposing privileged credentials. Tune into this webinar and learn how to: -Separate servers and administrator accounts into Microsoft’s three tiers […]

Post Tagged with
Read More