Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

About Aidy

Identity and access manager subject matter expert

One Identity UNITE Partner and User Conference

Post Image

One Identity UNITE Partner and User Conference 9-12 April 2018 | Nice, France Benefits to customer and partner attendees: -Gain valuable industry insights -Learn best practices and tips and tricks to improve technical proficiency and knowledge -Direct access to product development, product managers, product marketing and subject matter experts -Network with your peers -Be heard […]

Post Tagged with , ,
Read More

Forgerock Identity Live 2018 Conference

Post Image

Forgerock Identity Live 2018 Conference Date: May 2 – 3, 2018 Where: Austin, Texas Reserve your spot now to: – Learn how to to create a personalized, secure customer experience – Discuss hot topics including: Privacy, Security, and GDPR – Participate in live demos and discussions on IoT and Digital Identity Identity Live will be […]

Post Tagged with , ,
Read More

The new role of identity and authentication in the enterprise

Post Image

The new role of identity and authentication in the enterprise Identity and access management, preference management, and the role of secure internal and external API stores are becoming essential in the workplace. Financial institutions can use these technologies to confirm identity regarding payments and loans. Other companies can use them to provide access to social […]

Post Tagged with ,
Read More

Web Based User Management Platform

Post Image

Web Based User Management Platform The concept of web based user management has caught the attention of IT admins around the world. This is because traditional user management platforms have historically been complicated on-prem solutions like Microsoft® Active Directory® (AD) or OpenLDAP™. Nevertheless, as more IT resources shift to the cloud, more IT organizations are […]

Post Tagged with
Read More

BeyondTrust Introduces First-of-its Kind Solution to Protect Critical Network, IoT, ICS, and SCADA Devices from Privilege-based Attacks

Post Image

BeyondTrust Introduces First-of-its Kind Solution to Protect Critical Network, IoT, ICS, and SCADA Devices from Privilege-based Attacks BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, today announced a first-of-its kind privilege management solution for network, IoT, ICS, and SCADA devices. PowerBroker for Networks rounds out BeyondTrust’s privilege management […]

Post Tagged with ,
Read More

One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA

Post Image

One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA Description: Authenticate with RADIUS 2FA workflow fails during authentication with two-step RADIUS server. Read more at – One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA

Post Tagged with , ,
Read More

You Need More Than Single Sign-On

Post Image

You Need More Than Single Sign-On Single sign-on (SSO) solutions have been extremely popular over the last decade. In fact, the first generation IDaaS solutions have produced quite a few majorly successful companies. Cloud-based identity and access management is in high demand. But, as IT organizations know, conventional SSO doesn’t cover everything in IT infrastructure. […]

Post Tagged with ,
Read More

How to approach mobile password management for the enterprise

Post Image

How to approach mobile password management for the enterprise As new mobile security threats continue to emerge, traditional approaches to password management for the enterprise aren’t as effective as they once were — and IT pros must find new ways to properly manage mobile users and apps. Previous methods of password management for the enterprise […]

Post Tagged with ,
Read More

Can I Replace AD with LDAP?

Post Image

Can I Replace AD with LDAP? With the changes in the IT management tools space, many IT admins have had the thought, “Can I replace AD with LDAP?” The short answer is no, in most cases. There are some situations where this is possible, but in general, IT admins are better off replacing Active Directory® […]

Post Tagged with ,
Read More

Aurionpro concludes sale of IAM business to KPMG

Post Image

Aurionpro concludes sale of IAM business to KPMG Aurionpro Solutions today said it has concluded sale of its identity and access management (IAM) business to KPMG LLP, USA for about Rs 217 crore. On January 3, Cyberinc, an Aurionpro subsidiary, entered into a definitive agreement with KPMG LLP, USA for sale of its identity and […]

Post Tagged with , ,
Read More