Call us 

Discovering Identity and Access

Management Solutions

About Aidy

Identity and access manager subject matter expert

Behavioral Biometrics Emerging as a Key Security Solution

Post Image

Behavioral Biometrics Emerging as a Key Security Solution BioCatch is celebrating the rise of behavioral biometrics as a key security solution. In a new blog post, the company notes that a new report from Acuity Market Intelligence predicts that 2017 will be ‘a “breakout” year for biometrics,’ with the mainstreaming of this technology being “its […]

Post Tagged with ,
Read More

Bringing Your Enterprise Identity to the Cloud

Post Image

Bringing Your Enterprise Identity to the Cloud Join the Radiant Logic federated identity team at the upcoming RSA trade show at the Moscone Center in San Francisco on February 13-17, 2017. Come learn more about the latest features of RadiantOne, the company’s innovative federated identity platform based on advanced virtualization, featuring essential capabilities such as […]

Post Tagged with ,
Read More

Okta claims new local partners in A/NZ channel surge

Post Image

Okta claims new local partners in A/NZ channel surge Cloud-based identity management business, Okta, has recruited airloom, MOQdigital and Unify Solutions as its newest partners to deliver its access and identity management solutions to enterprises across the A/NZ region. The new partners said identity management is a critical facet to business’ transitions to the cloud. […]

Post Tagged with ,
Read More

Verato Lands $12.5M for Cloud-based Identity Matching Platform

Post Image

Verato Lands $12.5M for Cloud-based Identity Matching Platform Verato, Inc., a leading provider of cloud-based identity matching and Master Patient Index (MPI) solutions has raised $12.5 million in Series B funding led jointly by Bessemer Venture Partners and Columbia Capital. The McLean, VA-based company plans to utilize the funding to to support continued growth and […]

Post Tagged with
Read More

SailPoint Gives Enterprises the Power to Protect Against the Next Wave of Data Breaches

Post Image

SailPoint Gives Enterprises the Power to Protect Against the Next Wave of Data Breaches SailPoint, the undisputed leader in identity governance, today announced the latest version of its data access governance solution, SecurityIQ 5.0. SailPoint’s new release gives organizations the power to protect against the next big wave of data breaches through intelligent and actionable […]

Post Tagged with ,
Read More

Azure MFA cloud based protection for on-premises VPNs is now in public preview

Post Image

Azure MFA cloud based protection for on-premises VPNs is now in public preview How does the NPS Extension for Azure MFA work? With the NPS Extension for Azure MFA, which is installed as an extension to existing NPS Servers, the authentication flow includes the following components: – User/VPN Client: Initiates the authentication request. – NAS […]

Post Tagged with ,
Read More

One Identity Extends Top-Rated Active Roles Solution to Azure Active Directory

Post Image

One Identity Extends Top-Rated Active Roles Solution to Azure Active Directory One Identity, a recognized leader in identity and access management, today announced a new Active Roles version that extends best-in-class features to conquer the security and management challenges organizations face as they grapple with the complexities of hybrid Active Directory (AD) environments. With thousands […]

Post Tagged with ,
Read More

Understanding Security and Privileged Access in Azure Active Directory

Post Image

Understanding Security and Privileged Access in Azure Active Directory Azure AD is also nowhere close to being as mature as on-prem AD. There’s a lot of things you can’t do – such as fine grained delegation of admin authority. And there’s no organizational units in Azure AD. Here’s a few of the technical areas to […]

Read More

CA Technologies delivers privileged user governance to better protect against insider threats

Post Image

CA Technologies delivers privileged user governance to better protect against insider threats CA Southern Africa has announced the new release of CA Technologies, CA Identity Suite that includes integration with CA Privileged Access Manager for governance of privileged accounts. Features include new, flexible deployment options for agility, speed and ease-of-use in identity management and access […]

Post Tagged with ,
Read More

Designing a Break Glass Process to Provide Security for Privileged Accounts

Post Image

Designing a Break Glass Process to Provide Security for Privileged Accounts In this live webinar, join Cyber Security Expert, Derek A. Smith who will cover the following areas. – Access Control Model general overview – Break Glass Defined – Examples of situations when ‘break glass’ emergency access might be necessary – The Break Glass Solution […]

Read More