Call us 

Discovering Identity and Access

Management Solutions

VASCO IDENTIKEY Authentication Server and a look at its key features

Post Image

VASCO IDENTIKEY Authentication Server and a look at its key features The IDENTIKEY Authentication Server, which includes multifactor authentication software tools and DIGIPASS tokens offered by VASCO Data Security International Inc., adds additional security measures to standard username/password logins across a wide range of servers and services. This stops unauthorized logins, even when passwords have […]

Post Tagged with , ,
Read More

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network

Post Image

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today released new global research revealing that the overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major “snooping” […]

Post Tagged with
Read More

Executives tell us their password security best practices

Post Image

Executives tell us their password security best practices To mark October as Cyber Security Awareness month, we asked leaders in our community this question: Data breaches containing password information have become a regular occurrence. At the beginning of October, Yahoo revealed that its 2013 data breach affected 3 billion accounts, with not only passwords, but […]

Post Tagged with , ,
Read More

Why is the mobile identity management market growing exponentially?

Post Image

Why is the mobile identity management market growing exponentially? Mobile identity management is an approach that can address both usability and trust concerns in mobile business. It has been a fundamental service for the next-generation mobile telecommunications infrastructure. Mobile identity management is used to identify, acquire, access, and pay for services that follow the user […]

Post Tagged with
Read More

What is IDaaS, and why does your mobile strategy need it?

Post Image

What is IDaaS, and why does your mobile strategy need it? IDaaS is a set of user authentication tools that are managed by a third-party provider and delivered through the cloud. It is predicted that by 2021, as-a-service will be the predominant delivery model for identity and access management (IAM). These services are expected to […]

Post Tagged with
Read More

Authenticating your customers: the tripartite of consumer authentication

Post Image

Authenticating your customers: the tripartite of consumer authentication The recent Deloitte breach was yet another in a long line of data exposures that have their origin in authentication issues. In the case of Deloitte, the hackers gained access to Deloitte’s email system, putting clients emails, including potentially sensitive content and attachments, at risk of exposure. […]

Post Tagged with ,
Read More

HID Unifies ID Lifecycle Mgt with Quantum Secure SAFE Enterprise

Post Image

HID Unifies ID Lifecycle Mgt with Quantum Secure SAFE Enterprise HID Global, a competitor in the 2017 ‘ASTORS’ Homeland Security Awards Program, introduces Quantum Secure SAFE Enterprise to its SAFE Physical Identity and Access Management (PIAM) offering that brings together everything organizations need to streamline and centralize management of the entire lifecycle for employee, contractor […]

Post Tagged with ,
Read More

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries

Post Image

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries Veridium, a leader in identity access management solutions using biometrics as the primary authenticator, announced news that it has been awarded a grant from the Digital Financial Services Innovation Lab to develop and field test biometric authentication technology on unmodified Android smartphones, which can improve the […]

Post Tagged with ,
Read More

Get IAM Right – Insight Series with One Identity

Post Image

Get IAM Right – Insight Series with One Identity Join One Identity for our biweekly Insight Series of live webinars designed to help you Get IAM Right. Each webinar focuses on a specific area of identity and access management (IAM) and demonstrates real-world solutions that help you overcome the most common IAM challenges. Register for […]

Post Tagged with , ,
Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with ,
Read More