Call us 

Discovering Identity and Access

Management Solutions

Identity Manager and Access manager solutions

Attend the Automated Privileged Account Discovery Webinar!

Post Image

Attend the Automated Privileged Account Discovery Webinar! RED Identity Management automatically and on an ongoing basis discovers targets and privileged accounts a variety of ways, including service and process accounts. It will automatically detect changes in the enterprise and immediately update itself as systems and devices come on and off your network. Learning or discovery […]

Post Tagged with ,
Read More

How does Facebook’s Delegated Recovery enable account verification?

Post Image

How does Facebook’s Delegated Recovery enable account verification? Facebook introduced a new feature to improve password recovery that is designed to do away with security questions and email verifications. The protocol is called Delegated Recovery, and it somehow relies on other verification systems for third-party accounts. How does Facebook Delegated Recovery work, and could something […]

Read More

Workato and Okta Partner to Deliver Innovative Identity and Access Management Automations – with No Coding Required

Post Image

Workato and Okta Partner to Deliver Innovative Identity and Access Management Automations – with No Coding Required Workato, a leading integration and automation platform, today announced an integration with Okta, the leading independent provider of identity for the enterprise. Built by Atlas Identity, an Identity and Access Management (IAM) solutions provider, the integration delivers a […]

Read More

Step up authentication OpenID Connect

Post Image

Step up authentication OpenID Connect A common use case in access management is step up authentication. ForgeRock AM is very good for that. The OIDC standard talks about step up authentication and level of authentication requested by the client. To do so, one could use acr_values which is a voluntary claim, but the openid specification […]

Post Tagged with , ,
Read More

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide

Post Image

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide Gartner, Inc. has named CA Technologies (NASDAQ:CA) a Leader in the Gartner Magic Quadrant for Access Management, Worldwide 2017.* The report evaluated CA’s broad identity and access management portfolio and the company’s ability to execute and completeness of vision. “Access managers […]

Post Tagged with ,
Read More

OneLogin Password Manager Hacked

Post Image

OneLogin Password Manager Hacked The identity and access management service OneLogin, which uses Amazon Web Services (AWS) to store customer data, recently announced that an attacker had “obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the U.S.” […]

Post Tagged with , ,
Read More

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform

Post Image

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform The Identity and Access Management (IAM) landscape has drastically changed in recent years. Legacy IAM products like CA Single Sign-On® (formerly known as CA SiteMinder®) lack the flexibility to scale beyond traditional IAM scenarios. The guide will provide you with: – A comparison of differences […]

Post Tagged with , ,
Read More

WannaCry Ransomware – Protect Your Data Now

Post Image

WannaCry Ransomware – Protect Your Data Now In just four hours, WannaCry ransomware spread across the UK and Spain, halting operations at factories, hospitals, and communications companies in its wake. Since it burst onto the scene on Friday, May 12th, it has continued its global spread, infecting over 230,000 systems in over 100 countries. The […]

Post Tagged with , ,
Read More

Contractors, unstructured data amongst major security concerns, says SailPoint

Post Image

Contractors, unstructured data amongst major security concerns, says SailPoint How are enterprises changing their approach to security? Contractors, corporate security and unstructured data might be efficient ways of doing business, but according to SailPoint’s 9th annual Market Pulse Survey, they might be the downfall to effective security approaches. The survey gained responses from 600 senior […]

Read More

ForgeRock Expands Edge Security Early Access Program with Developers and Manufacturers from the Connected and Autonomous Vehicle Industries

Post Image

ForgeRock Expands Edge Security Early Access Program with Developers and Manufacturers from the Connected and Autonomous Vehicle Industries ForgeRock®, the leading platform provider of digital identity management solutions, today announced three new partners in its efforts to secure the internet of things and the connected car through digital identity management. Renesas and IoT.bzh are collaborating […]

Post Tagged with , ,
Read More