Call us 

Discovering Identity and Access

Management Solutions

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with ,
Read More

Step up authentication OpenID Connect

Post Image

Step up authentication OpenID Connect A common use case in access management is step up authentication. ForgeRock AM is very good for that. The OIDC standard talks about step up authentication and level of authentication requested by the client. To do so, one could use acr_values which is a voluntary claim, but the openid specification […]

Post Tagged with , ,
Read More

CA Strong Authentication offers businesses low-cost MFA and 2FA

Post Image

CA Strong Authentication offers businesses low-cost MFA and 2FA CA Technologies’ Strong Authentication product is a multifactor authentication product that adds additional security measures — using biometrics and smartphones — to standard username/password logins for a variety of servers and services, such as Active Directory, Salesforce and the Outlook web app. Read more at – CA Strong Authentication offers businesses low-cost MFA […]

Post Tagged with , , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with , ,
Read More

Forrester’s Risk-Driven Identity And Access Management Process Framework

Post Image

Forrester’s Risk-Driven Identity And Access Management Process Framework Identity and access management (iAM) processes have always been convoluted. they affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to protect against new or emerging threats, whether from the outside or the inside. Read more at – Forrester’s Risk-Driven […]

Post Tagged with , ,
Read More

Okta Adaptive MFA gives companies flexible authentication

Post Image

Okta Adaptive MFA gives companies flexible authentication Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access.Unlike most of the other multifactor authentication (MFA) products, Okta Adaptive MFA is an MFA tool within the Okta Platform ecosystem that stems from single sign-on. […]

Post Tagged with , , ,
Read More

The NotPetya Global Pandemic – CyberArk Labs Analysis

Post Image

The NotPetya Global Pandemic – CyberArk Labs Analysis In May 2017, WannaCry took advantage of an exploit in the Windows operating system to usher in a cyber security pandemic – ransomware that can spread its infection like a traditional worm. The results were catastrophic, with some damage estimates reaching up to more than $4 billion. […]

Post Tagged with ,
Read More

Okta Extends Canadian Presence with New Downtown Toronto Office

Post Image

Okta Extends Canadian Presence with New Downtown Toronto Office Okta, Inc., the leading independent provider of identity for the enterprise, today announced the opening of its new Canadian office in downtown Toronto. With the new office, Okta will tap into the area’s diverse high-technology talent pool to grow its engineering team, and create proximity to […]

Post Tagged with ,
Read More

Five Ways Identity Reduces Costs to Healthcare Providers

Post Image

Five Ways Identity Reduces Costs to Healthcare Providers Identity governance also offers a powerful value proposition to providers in the form of cost reduction. This is especially appealing when you consider that U.S. hospitals earn on average single-digit margins (Chart A). The American Hospital Association further reports that many providers operate in the negative. Through […]

Post Tagged with , , ,
Read More

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event

Post Image

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event Cloud Identity Summit (CIS), the world’s premier identity conference, today announced highlights of the 2017 event and plans for the next iteration of Cloud Identity Summit, to be called “Identiverse” 2018 in Boston. More than 1,500 attendees shared their perspectives on rapidly evolving trends and best […]

Post Tagged with ,
Read More