Call us 

Discovering Identity and Access

Management Solutions

New Product Version Release Identity Manager 7.1.2

Post Image

New Product Version Release Identity Manager 7.1.2 One Identity is excited to announce a new version of Identity Manager is now available. Look what’s new: • Hyper Views for Azure Active Directory, Unix, Cloud System Management, and SAP R/3 • Support for Exchange Online as Target System • Various components specific enhancements and bug fixes […]

Read More

Attend the Automated Privileged Account Discovery Webinar!

Post Image

Attend the Automated Privileged Account Discovery Webinar! RED Identity Management automatically and on an ongoing basis discovers targets and privileged accounts a variety of ways, including service and process accounts. It will automatically detect changes in the enterprise and immediately update itself as systems and devices come on and off your network. Learning or discovery […]

Post Tagged with ,
Read More

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries

Post Image

Veridium Rolls Out Fingerprint Verification Pilot In Developing Countries Veridium, a leader in identity access management solutions using biometrics as the primary authenticator, announced news that it has been awarded a grant from the Digital Financial Services Innovation Lab to develop and field test biometric authentication technology on unmodified Android smartphones, which can improve the […]

Post Tagged with ,
Read More

Get IAM Right – Insight Series with One Identity

Post Image

Get IAM Right – Insight Series with One Identity Join One Identity for our biweekly Insight Series of live webinars designed to help you Get IAM Right. Each webinar focuses on a specific area of identity and access management (IAM) and demonstrates real-world solutions that help you overcome the most common IAM challenges. Register for […]

Post Tagged with , ,
Read More

How does the Microsoft Authenticator application affect password use?

Post Image

How does the Microsoft Authenticator application affect password use? In an effort to reduce password usage, Microsoft introduced a new smartphone-based login feature for its Microsoft Authenticator application. How does this feature work, and can methods like this effectively eliminate passwords? Protecting passwords has always been a thorn in the side of security practitioners looking […]

Read More

Workato and Okta Partner to Deliver Innovative Identity and Access Management Automations – with No Coding Required

Post Image

Workato and Okta Partner to Deliver Innovative Identity and Access Management Automations – with No Coding Required Workato, a leading integration and automation platform, today announced an integration with Okta, the leading independent provider of identity for the enterprise. Built by Atlas Identity, an Identity and Access Management (IAM) solutions provider, the integration delivers a […]

Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with ,
Read More

Step up authentication OpenID Connect

Post Image

Step up authentication OpenID Connect A common use case in access management is step up authentication. ForgeRock AM is very good for that. The OIDC standard talks about step up authentication and level of authentication requested by the client. To do so, one could use acr_values which is a voluntary claim, but the openid specification […]

Post Tagged with , ,
Read More

What is the current market scenario of United States Cloud Identity And Access Management Market?

Post Image

What is the current market scenario of United States Cloud Identity And Access Management Market? This report on United States Cloud Identity And Access Management (IAM) market is a detailed research study that helps provides answers and pertinent questions with respect to the emerging trends and growth opportunities in this particular industry. It helps identify […]

Post Tagged with , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with , ,
Read More