Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

White paper: Identity and Access Management (IAM) without compromise

Post Image

White paper: Identity and Access Management (IAM) without compromise IT and business executives are tasked with two strategic directives that seem inherently contradictory – they must empower the business and its people to operate at maximum speed while providing, at the same time, the optimum levels of security and risk management. Businesses of all sizes […]

Post Tagged with
Read More

Webinar: Evolve and Extend Your ISAM Portal with the RadiantOne

Post Image

Webinar: Evolve and Extend Your ISAM Portal with the RadiantOne Thursday April 20 for new webinar on how RadiantOne, federated identity service, can help evolve your ISAM deployment by: – Integrating identities into a common and authoritative source. – Reducing deployment time by leveraging and abstracting existing identity stores through virtualization. – Eliminating the risk […]

Post Tagged with ,
Read More

Entrust Datacard Introduces the Ultimate Identity Platform

Post Image

Entrust Datacard Introduces the Ultimate Identity Platform Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced the introduction of the company’s ultimate identity platform. The ultimate identity platform combines enhancements in image quality, reliability, durability, modularity, versatility, mobility and security to provide issuers with the ultimate experience in identity […]

Post Tagged with ,
Read More

The importance of IAM in an increasingly connected world

Post Image

The importance of IAM in an increasingly connected world Cybersecurity is a key concern for businesses today especially as employees are increasingly using connected devices. According to Gartner estimates, 8.4 billion connected things will be in use worldwide in 2017. As the technology landscape evolves, business leaders need to steer through the intersection of digital […]

Post Tagged with ,
Read More

What is the Cost of Doing Nothing?

Post Image

What is the Cost of Doing Nothing? Hospitals and clinics face regular threats to people and property from both outside and inside forces. Physical assaults, infant abductions, theft of medical supplies, drugs, or confidential patient information are all issues with which today’s healthcare security professionals must contend. Not only must security protect against these threats, […]

Post Tagged with ,
Read More

SailPoint tackling unstructured data vulnerabilities for Australian organisations

Post Image

SailPoint tackling unstructured data vulnerabilities for Australian organisations With their identity management ducks somewhat aligned, SailPoint president Kevin Cunningham has said organisations in Australia are now turning to his firm to tackle the threats targeting unstructured data. In Sydney meeting with local customers, the identity governance firm co-founder told ZDNet that as one obstacle is […]

Post Tagged with ,
Read More

The Great Identity/Authentication Confusion

Post Image

The Great Identity/Authentication Confusion At this year’s PYMNTS Innovation Project, Admiral James Stavridis, NATO’s former Supreme Commander, said that one of the biggest points of compromise that cybercrooks exploit is the login. And that for far too long, more focus has been placed on password security and management — accessing information — rather than on […]

Post Tagged with , ,
Read More

Quantum Secure SAFE Physical Identity And Access Management Platform Continues Growth

Post Image

Quantum Secure SAFE Physical Identity And Access Management Platform Continues Growth Quantum Secure, part of HID Global, a provider of secure identity solutions, continues to grow its roster of end users for its SAFE platform. 2016 growth was seen in the application of all SAFE core technologies and was additionally fueled by further expansion of […]

Post Tagged with ,
Read More

Five Secrets Of Enterprise Password Management

Post Image

Five Secrets Of Enterprise Password Management In spite of the billions of dollars that enterprises spend each year in an effort to secure their environments and achieve regulatory compliance, many still fail at the most basic security tasks. The fact of the matter is that many organizations do not properly manage their credentials, exposing themselves […]

Post Tagged with ,
Read More

Vendor Comparison in Identity and Access Management 2017 – Research and Markets

Post Image

Vendor Comparison in Identity and Access Management 2017 – Research and Markets Research and Markets has announced the addition of the “Vendor Comparison in Identity and Access Management 2017: MnM Dive Matrix” report to their offering. The vendor comparison report on Identity and Access Management (IAM) based on MNM DIVE methodology covers a detailed study […]

Post Tagged with ,
Read More