Call us 

Discovering Identity and Access

Management Solutions

Hackers Trading Email And Passwords From Thousands Of British Politicians And Officials

Post Image

Hackers Trading Email And Passwords From Thousands Of British Politicians And Officials Earlier today, The Times reported that hackers are trading email addresses and passwords belonging to thousands of British politicians, ambassadors and other top officials online. The newspaper conducted an investigation, which found two massive lists of stolen credentials were put up for sale […]

Post Tagged with , ,
Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with
Read More

Cloud Identity and Access Manager Okta Hires First CIO

Post Image

Cloud Identity and Access Manager Okta Hires First CIO As chief information officer at BMC Software Inc., Mark Settle installed identity and access management tools developed by Okta Inc., a little-known tech startup at the time. Three years later, Mr. Settle, an enterprise IT veteran with roughly 25 years of industry experience, this month became […]

Post Tagged with ,
Read More

Microsoft placed in the “leaders” category of Gartner’s Magic Quadrant for IDaaS

Post Image

Microsoft placed in the “leaders” category of Gartner’s Magic Quadrant for IDaaS Gartner has recognized Microsoft as a Leader, positioned furthest to the right for completeness of vision, in the 2016 Magic Quadrant for Identity and Access Management as a Service. In only its second year on the Gartner Identity and Access Management as a […]

Read More

Centrify Named a Leader in the 2016 Magic Quadrant for Identity and Access Management as a Service, Worldwide

Post Image

Centrify Named a Leader in the 2016 Magic Quadrant for Identity and Access Management as a Service, Worldwide Centrify, the leader in securing enterprise identities against cyberthreats, today announced it has been positioned by Gartner, Inc. in the leaders quadrant of the Gartner “Magic Quadrant for Identity and Access Management as a Service, Worldwide. According […]

Read More

STEALTHbits to Cover Unstructured Data Access at Gartner IAM Conference

STEALTHbits to Cover Unstructured Data Access at Gartner IAM Conference STEALTHbits Technologies, Inc., a leading data security software company that ensures the right people have the right access to the right information, announced it will be exhibiting at the Gartner Identity & Access Management Summit 2015, December 7th through the 9th in Las Vegas. “Historically, […]

Read More

Lieberman Software Provides Proactive, Automated Privilege Management for Cyber Defense Against Zero Day Exploits

Lieberman Software Provides Proactive, Automated Privilege Management for Cyber Defense Against Zero Day Exploits In today’s cyber security environment, a common assumption is that advanced zero day threats are now indefensible due to the sophisticated and automated nature of the attacks. This week, in booth 325 at the Gartner Security and Risk Management Summit, Lieberman […]

Read More

Okta Named the Sole Leader in Gartner Magic Quadrant for IDaaS

Okta Named the Sole Leader in Gartner Magic Quadrant for IDaaS eading analyst firm, Gartner Inc., has positioned Okta as the sole leader in its Magic Quadrant for Identity and Access Management as a Service (IDaaS), and a leader for the second consecutive year. The report was authored by Gartner Research VP, Gregg Kreizman, and […]

Read More

Gartner Identity & Access Management Summit

Gartner Identity & Access Management Summit – Identity and Access Management Summit is set for 7-9 December 2015 – Gartner IAM Summit was designed for individuals in the following roles: IAM Leaders, IAM Architects, Security Leaders – Gartner Events on Demand offers access to recorded sessions from this event Read more at – Gartner Identity […]

Read More

Courion Explores How to Identify and Remediate Access Risk in March 16th Session at Gartner Identity and Access Management Summit

Courion Explores How to Identify and Remediate Access Risk in March 16th Session at Gartner Identity and Access Management Summit Courion, a leading provider of intelligent identity and access management (IAM) solutions, today announced that Kurt Johnson, Vice President of Strategy & Corporate Development for Courion, will be speaking at the 2015 Gartner Identity and […]

Read More