Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification

Post Image

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification SailPoint Technologies Holdings, Inc., the leader in enterprise identity governance, today announced it has completed two information security assessments for IdentityNowTM, SailPoint’s SaaS-based identity solution. SailPoint successfully completed an ISO/IEC 27001:2013 certification and obtained a SOC 2® Type 2 report with an unqualified opinion for IdentityNow controls relative to […]

Post Tagged with , ,
Read More

Entersekt Partners With ForgeRock

Post Image

Entersekt Partners With ForgeRock Entersekt, a pioneer in mobile-first authentication and e-commerce enablement, announced today that it has joined the ForgeRock Trust Network as a principal technology partner. ForgeRock is a leading provider of identity and access management solutions to a wide range of industries, including financial services, retail, healthcare, higher education, and communications, in […]

Post Tagged with ,
Read More

Optimal IdM Announces Customer Support for GDPR

Post Image

Mistaken Identity: Clear Eyes, Full Data, Can’t Lose Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR). Taking effect in May of 2018, GDPR will require global organizations to control, process and protect […]

Post Tagged with ,
Read More

Improving Cybersecurity: 12 Tools and Approaches Your Business Can Use

Post Image

Improving Cybersecurity: 12 Tools and Approaches Your Business Can Use As 2018 gets moving, cybersecurity remains at the front of many business leaders’ minds. Data breaches are a constant threat to your organization’s customer data, which means organizations must remain vigilant in their attempts to prevent a cyberattack from breaking through or causing damage. As […]

Post Tagged with
Read More

Easy IAM security best practices for a more secure AWS Cloud

Post Image

Easy IAM security best practices for a more secure AWS Cloud The focus of this article is on how you can do a couple of simple tasks that will bolster IAM security, which you can apply to your AWS cloud. Some of these actions are: – Removing the root access keys – Using users and […]

Post Tagged with ,
Read More

The Auto Club Group Enables Secure Digital Identity & Access Management for Members

Post Image

The Auto Club Group Enables Secure Digital Identity & Access Management for Members OpenText, the global leader in Enterprise Information Management (EIM), today announced that The Auto Club Group (ACG) – the second largest AAA club in North America – has selected OpenText to support a unified identity and access management solution for their 9 […]

Post Tagged with
Read More

Establishing Trust With Identity Governance Intelligence

Post Image

Establishing Trust With Identity Governance Intelligence Many organizations do not keep well-documented records of where all their data is housed. This is a serious problem with so many new regulations requiring companies to be more accountable for protecting information. Does your organization know exactly who its users are, what they’re entitled to access and where […]

Post Tagged with ,
Read More

Okta teams with SailPoint for joint identity management service

Post Image

Okta teams with SailPoint for joint identity management service SaaS identity providers Okta and SailPoint Technologies have inked a strategic partnership that aims to tackle access and identity governance problems for enterprises. Okta and SailPoint are often pitted as rivals, but the companies offer different solutions to the online identity management problem. Okta functions as […]

Post Tagged with , ,
Read More

Steps to a successful IAMG project

Post Image

Steps to a successful IAMG project It is becoming increasingly important that organisations constantly manage and control employee access to information and systems within the organisation. Philip Yazbek, industrial psychologist from consulting firm Bizmod, says that the responsibility of governing and protecting information and data lies with the organisation, and as such an identity access […]

Post Tagged with
Read More

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications

Post Image

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications The Kantara Initiative formally announced today the approval and publication of the User-Managed Access (UMA) Version 2.0 (UMA 2.0) technical specifications. UMA 2.0 offers significant enhancements to the established global standard bringing user consent, control and trust into easier reach for organizations processing personal data. UMA is […]

Post Tagged with ,
Read More