Call us 

Discovering Identity and Access

Management Solutions

Webinar: A Better, Faster Way to Integrate Identity Data for Healthcare Companies

Post Image

Webinar: A Better, Faster Way to Integrate Identity Data for Healthcare Companies Join on Thursday, May 18 for a new webinar on how RadiantOne, federated identity service, uses advanced virtualization to provide: – business-agile consolidation strategy—Bring acquisitions online in days, not months by federating existing directories and identity sources. – single place to point key […]

Post Tagged with , ,
Read More

Cybersecurity And Password Trends Around The World Do More Harm Than Good For Customers

Post Image

Cybersecurity And Password Trends Around The World Do More Harm Than Good For Customers It’s normally in the final seconds of a TV or radio interview that security experts get asked for advice for the general public – something simple, unambiguous, and universally applicable. It’s a fair question, and what the public want. But simple […]

Post Tagged with ,
Read More

Government ID Cards More Secure With Card Personalisation

Post Image

Government ID Cards More Secure With Card Personalisation It is estimated that more than 90 per cent of photo ID card inspections are undertaken visually and in the field, with visual inspections often being the primary form of document investigation and validation. Any decisions to use a secondary inspection criteria is often based on the […]

Post Tagged with , ,
Read More

Webinar: Active Directory Auditing 2017: Get the auditors off your back, in 1 hour or less

Post Image

Webinar: Active Directory Auditing 2017: Get the auditors off your back, in 1 hour or less Join Live: Thursday, May 18, 2017 | 10am PDT / 1pm EDT Nick Cavalancia _ bio.jpgw/ security expert and founder of Techvangelism, Nick Cavalancia If you’ve ever been audited, you know it’s less fun than pulling teeth. Increasingly more […]

Post Tagged with ,
Read More

How to get started with IAM services in the cloud

Post Image

How to get started with IAM services in the cloud Cloud computing has changed the way users connect to enterprise apps and data. With a more distributed compute model, cloud enables users to step out of bounds into a more mobile environment. As a result, cloud computing, along with BYOD policies and mobile applications, lead […]

Post Tagged with ,
Read More

How identity management systems strengthen cybersecurity readiness

Post Image

How identity management systems strengthen cybersecurity readiness Identity management, sometimes called identity and access management (IAM), is much more than simply providing users with logon capabilities to a system or network. Identity management is one of the fundamental cybersecurity objectives outlined in part one of this series that can help enterprises achieve a state of […]

Post Tagged with ,
Read More

Start redrawing your identity and access management roadmap

Post Image

Start redrawing your identity and access management roadmap Retro can be fun, but when it comes to roadmaps, you want the latest in GPS technology. And if new tech is best for secure trip planning, it’s doubly useful for keeping your enterprise systems and data secure. A key tool for reaching a secure destination is […]

Post Tagged with ,
Read More

White Paper: Data Governance Strategies for the Digital Age

Post Image

White Paper: Data Governance Strategies for the Digital Age In the digital age, companies are generating, storing and maintaining a sometimes overwhelming amount of “big data.” The trend has forced companies to alter — and sometimes completely revamp — information governance strategy. In this handbook, discover the governance complications created by big data and employee […]

Post Tagged with
Read More

Internet Of Things Identity Access Management Mkt Set To Grow

Post Image

Internet Of Things Identity Access Management Mkt Set To Grow The IoT Identity Access Management (IAM) market is expected to explode in the coming years, with Research and Markets projecting the market size to go from $1.1 billion in 2016 to $4.97 billion by 2021. That represents a CAGR of 35.2 percent from 2016 to […]

Post Tagged with , ,
Read More

The most common passwords of 2016

Post Image

The most common passwords of 2016 Looking at the list of 2016’s most common passwords, I can’t stop shaking my head. Nearly 17 percent of users are safeguarding their accounts with “123456.” What really perplexes me is that so many website operators are not enforcing password security best practices. Read more at – The most common […]

Post Tagged with ,
Read More