Call us 

Discovering Identity and Access

Management Solutions

Biometrics and beyond: Online authentication techniques get personal

Post Image

Biometrics and beyond: Online authentication techniques get personal It is now, apparently, the age of intelligent authentication. In the world of authentication techniques, security experts long have bemoaned the weakness of the password and username form of authentication security. But now it seems there are tools available to replace that system, ones that employ biometrics […]

Post Tagged with ,
Read More

Sailpoint Webinar – Accelerate Compliance with Comprehensive Identity Governance

Post Image

Sailpoint Webinar – Accelerate Compliance with Comprehensive Identity Governance Date: Wednesday, November 8 Time: 10am PT | 12pm CT | 1pm ET By implementing a comprehensive identity governance strategy across all systems and files you can prepare for GDPR while also improving your security posture. Join this webinar to learn more about how a comprehensive […]

Post Tagged with , ,
Read More

VASCO IDENTIKEY Authentication Server and a look at its key features

Post Image

VASCO IDENTIKEY Authentication Server and a look at its key features The IDENTIKEY Authentication Server, which includes multifactor authentication software tools and DIGIPASS tokens offered by VASCO Data Security International Inc., adds additional security measures to standard username/password logins across a wide range of servers and services. This stops unauthorized logins, even when passwords have […]

Post Tagged with , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with ,
Read More

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network

Post Image

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today released new global research revealing that the overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major “snooping” […]

Post Tagged with
Read More

Triptic Integrates Tools4ever’s Cloud-Based SSO Portal, HelloID, With Iris Intranet

Post Image

Triptic Integrates Tools4ever’s Cloud-Based SSO Portal, HelloID, With Iris Intranet Tools4ever, a worldwide market leader in providing access governance software and solutions, and triptic, supplier of social intranet solution Iris Intranet, are excited to announce a new, far-reaching partnership. The integration of both solutions offers employees a comprehensive application launcher — providing access to all […]

Post Tagged with ,
Read More

Global Cloud Identity and Access Management Industry is set to Boom in Future

Post Image

Global Cloud Identity and Access Management Industry is set to Boom in Future A new market intelligence study has recently been added by QYReseachReports.com to its vast collection of research reports. The 113-page research study, titled “Global Cloud Identity and Access Management (IAM) Market Research Report 2016,” provides a thorough analysis of the market, including […]

Read More

Is there a data blind spot in your identity governance strategy? Sailpoint Video

Post Image

Is there a data blind spot in your identity governance strategy? With 80% of enterprise information made up of unstructured data, the inability to protect access to sensitive data presents a serious security and data breach risk. Watch this Sailpoint video and learn how to: • Govern access to your enterprise data, on-premises and in […]

Post Tagged with , ,
Read More

With Password Logins Proving Inefficient, What Trajectory Is Identity Management and User Account Security on in 2017?

Post Image

With Password Logins Proving Inefficient, What Trajectory Is Identity Management and User Account Security on in 2017? We’ve had the humble password as a tool to login into our personal accounts on different services for the best part of twenty years and similar to a safe, it is a security measure that makes sure only […]

Post Tagged with
Read More

Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks, One Identity Survey Reveals

Post Image

Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks, One Identity Survey Reveals One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today released study results showing significant gaps in how organizations manage accounts used to access IT infrastructure, systems, […]

Post Tagged with , ,
Read More