Call us 

Discovering Identity and Access

Management Solutions

Multi-Factor Authentication with Oracle Identity Cloud Services

Post Image

Multi-Factor Authentication with Oracle Identity Cloud Services The Multi-Factor Authentication part I post described the initial MFA configuration, the enrollment process and second factor authentication with the Mobile Authenticator One-Time Password. In this second post, we will go over the other factors: security questions, notifications, text messages and bypass code – and the additional security […]

Post Tagged with ,
Read More

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio

Post Image

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio Fujitsu today announces that it is broadening its advanced biometric security solutions portfolio through an agreement with ImageWare Systems, (OTCQB:IWSY), to resell key security capabilities including enterprise mobile biometric user authentication as a service. The agreement will see Fujitsu not only extend its biometric […]

Post Tagged with ,
Read More

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide

Post Image

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide Gartner, Inc. has named CA Technologies (NASDAQ:CA) a Leader in the Gartner Magic Quadrant for Access Management, Worldwide 2017.* The report evaluated CA’s broad identity and access management portfolio and the company’s ability to execute and completeness of vision. “Access managers […]

Post Tagged with ,
Read More

Identity Defined Security Alliance Launches New Initiatives to Help CISOs Better Protect Mobile and Cloud Enterprises

Post Image

Identity Defined Security Alliance Launches New Initiatives to Help CISOs Better Protect Mobile and Cloud Enterprises The Identity Defined Security Alliance (IDSA), an organization dedicated to helping enterprises keep their data secure and accessible to the right people at the right time, today announced a series of new actions and initiatives aimed at helping CISOs […]

Post Tagged with ,
Read More

Identity Management Metrics your Board of Directors Will Care About

Post Image

Identity Management Metrics your Board of Directors Will Care About We are living in the age of the data breach. There were more significant data breaches this year than ever before—873, according to a report from the Identity Theft Resource Center. In many of these high profile breaches, hackers used weak identity management policies as […]

Post Tagged with , ,
Read More

Tools4ever Partners with eSchoolData

Post Image

Tools4ever Partners with eSchoolData Tools4ever, the market leader in identity governance and administration (IGA), has partnered with eSchoolData and developed a connector for its student information system via its GURU interface system. Tools4ever’s connector makes it possible give each user one digital identity, and allows education entity IT administrators the ability to provision user accounts, […]

Post Tagged with ,
Read More

BeyondTrust Recognized Among PAM Leaders in the KuppingerCole 2017

Post Image

BeyondTrust Recognized Among PAM Leaders in the KuppingerCole 2017 BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, announced today that it has been named among the leaders in every category of the KuppingerCole 2017 Leadership Compass for Privilege Management. The recognition comes as the latest in a string […]

Post Tagged with ,
Read More

An Execution Leader: Okta Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide

Post Image

An Execution Leader: Okta Named a Leader in Inaugural Gartner Magic Quadrant for Access Management, Worldwide -Okta, Inc., the leading independent provider of identity for the enterprise, today announced that the company has been recognized by Gartner Inc. as a Leader in the “Magic Quadrant for Access Management, Worldwide 2017.” In the report, Okta placed […]

Post Tagged with ,
Read More

Identity management remains one of the top cloud security challenges

Post Image

Identity management remains one of the top cloud security challenges To know how seriously business leaders take IT security issues, look at the budget. There’s almost always money in there for security — even when spending is tightly constrained in other areas. Cloud security challenges are among the chief concerns for many organizations, and understandably […]

Post Tagged with ,
Read More