Call us 

Discovering Identity and Access

Management Solutions

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution

Post Image

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution -SailPoint, the leader in enterprise identity management, today announced extended market traction for IdentityNow, the industry’s most complete cloud-based identity governance solution. IdentityNow is the fastest growing segment of SailPoint’s business with its customer footprint growing 50 percent in the past year. SailPoint also unveiled […]

Post Tagged with , ,
Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with
Read More

How identity management systems strengthen cybersecurity readiness

Post Image

How identity management systems strengthen cybersecurity readiness Identity management, sometimes called identity and access management (IAM), is much more than simply providing users with logon capabilities to a system or network. Identity management is one of the fundamental cybersecurity objectives outlined in part one of this series that can help enterprises achieve a state of […]

Post Tagged with ,
Read More

Start redrawing your identity and access management roadmap

Post Image

Start redrawing your identity and access management roadmap Retro can be fun, but when it comes to roadmaps, you want the latest in GPS technology. And if new tech is best for secure trip planning, it’s doubly useful for keeping your enterprise systems and data secure. A key tool for reaching a secure destination is […]

Post Tagged with ,
Read More

White Paper: Data Governance Strategies for the Digital Age

Post Image

White Paper: Data Governance Strategies for the Digital Age In the digital age, companies are generating, storing and maintaining a sometimes overwhelming amount of “big data.” The trend has forced companies to alter — and sometimes completely revamp — information governance strategy. In this handbook, discover the governance complications created by big data and employee […]

Post Tagged with
Read More

How do identity governance and access management systems differ?

Post Image

How do identity governance and access management systems differ? Giving proper rights to data is imperative when it comes to securing sensitive information and performing access management. Access management is the process by which a company identifies, tracks and controls which users have access to a particular system or application. Access management systems are more […]

Post Tagged with , ,
Read More

Verato Lands $12.5M for Cloud-based Identity Matching Platform

Post Image

Verato Lands $12.5M for Cloud-based Identity Matching Platform Verato, Inc., a leading provider of cloud-based identity matching and Master Patient Index (MPI) solutions has raised $12.5 million in Series B funding led jointly by Bessemer Venture Partners and Columbia Capital. The McLean, VA-based company plans to utilize the funding to to support continued growth and […]

Post Tagged with
Read More

Oracle Announcing global availability of Identity Cloud Service!

Post Image

Oracle Announcing global availability of Identity Cloud Service! Oracle announced a few weeks ago about the imminent availability of the Identity Cloud Service (IDCS) – Oracle’s comprehensive Identity and Access Management platform for the cloud. We are pleased to announce today that the service is now GA (Generally Available) and onboarding enterprise customers the world […]

Read More

Centrify Receives the Highest Service Score in “Workforce to SaaS” Use Case by Gartner for IDaaS, Worldwide

Post Image

Centrify Receives the Highest Service Score in “Workforce to SaaS” Use Case by Gartner for IDaaS, Worldwide Centrify, the leader in securing enterprise identities against cyberthreats, today announced it has received the highest service score in the “Workforce to SaaS” use case by Gartner, Inc. in its “Critical Capabilities for Identity and Access Management as […]

Read More

Securing Privileged Access In IaaS

Post Image

Securing Privileged Access In IaaS In the cloud (public/private) there are a lot of new credential types, authorization models, and proxy scenarios due to the completely new consumption, compute, network perimeters, provisioning and security models. If you look at Infrastructure as a Service (IaaS), privileged access to the infrastructure means PIM must also manage and […]

Post Tagged with ,
Read More