Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Biometrics and beyond: Online authentication techniques get personal

Post Image

Biometrics and beyond: Online authentication techniques get personal It is now, apparently, the age of intelligent authentication. In the world of authentication techniques, security experts long have bemoaned the weakness of the password and username form of authentication security. But now it seems there are tools available to replace that system, ones that employ biometrics […]

Post Tagged with ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with ,
Read More

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network

Post Image

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today released new global research revealing that the overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major “snooping” […]

Post Tagged with
Read More

StoneLock introduces biometric credentialing and identity management solution

Post Image

StoneLock introduces biometric credentialing and identity management solution StoneLock recently introduced a complete biometric-centric credentialing and identity management solution. StoneLock Gateway is a biometrics solution offering enterprises scalability and seamless functionality across multiple simultaneously connected physical access control systems, enterprise resource planning systems and other external system integrations. Enterprises can seamlessly integrate multiple globally distributed […]

Post Tagged with ,
Read More

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries

Post Image

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries Veridium, a leader in identity access management solutions using biometrics as the primary authenticator, announced news that it has been awarded a grant from the Digital Financial Services Innovation Lab to develop and field test biometric authentication technology on unmodified Android smartphones, which can improve the […]

Post Tagged with ,
Read More

What is the current market scenario of United States Cloud Identity And Access Management Market?

Post Image

What is the current market scenario of United States Cloud Identity And Access Management Market? This report on United States Cloud Identity And Access Management (IAM) market is a detailed research study that helps provides answers and pertinent questions with respect to the emerging trends and growth opportunities in this particular industry. It helps identify […]

Post Tagged with , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with , ,
Read More

Forrester’s Risk-Driven Identity And Access Management Process Framework

Post Image

Forrester’s Risk-Driven Identity And Access Management Process Framework Identity and access management (iAM) processes have always been convoluted. they affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to protect against new or emerging threats, whether from the outside or the inside. Read more at – Forrester’s Risk-Driven […]

Post Tagged with , ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event

Post Image

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event Cloud Identity Summit (CIS), the world’s premier identity conference, today announced highlights of the 2017 event and plans for the next iteration of Cloud Identity Summit, to be called “Identiverse” 2018 in Boston. More than 1,500 attendees shared their perspectives on rapidly evolving trends and best […]

Post Tagged with ,
Read More