Call us 

Discovering Identity and Access

Management Solutions

Step up authentication OpenID Connect

Post Image

Step up authentication OpenID Connect A common use case in access management is step up authentication. ForgeRock AM is very good for that. The OIDC standard talks about step up authentication and level of authentication requested by the client. To do so, one could use acr_values which is a voluntary claim, but the openid specification […]

Post Tagged with , ,
Read More

What is the current market scenario of United States Cloud Identity And Access Management Market?

Post Image

What is the current market scenario of United States Cloud Identity And Access Management Market? This report on United States Cloud Identity And Access Management (IAM) market is a detailed research study that helps provides answers and pertinent questions with respect to the emerging trends and growth opportunities in this particular industry. It helps identify […]

Post Tagged with , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with , ,
Read More

Forrester’s Risk-Driven Identity And Access Management Process Framework

Post Image

Forrester’s Risk-Driven Identity And Access Management Process Framework Identity and access management (iAM) processes have always been convoluted. they affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to protect against new or emerging threats, whether from the outside or the inside. Read more at – Forrester’s Risk-Driven […]

Post Tagged with , ,
Read More

Has ForgeRock Betrayed Its Community?

Post Image

Has ForgeRock Betrayed Its Community? One of the fundamental freedoms open source is being able to change to another supplier if the original one stops being useful – overcharging, acquired by a toxic owner, development terminated, and so on. Forgerock is a company that used the open source freedoms of Sun’s identity management software to […]

Post Tagged with ,
Read More

Okta Adaptive MFA gives companies flexible authentication

Post Image

Okta Adaptive MFA gives companies flexible authentication Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access.Unlike most of the other multifactor authentication (MFA) products, Okta Adaptive MFA is an MFA tool within the Okta Platform ecosystem that stems from single sign-on. […]

Post Tagged with , , ,
Read More

The NotPetya Global Pandemic – CyberArk Labs Analysis

Post Image

The NotPetya Global Pandemic – CyberArk Labs Analysis In May 2017, WannaCry took advantage of an exploit in the Windows operating system to usher in a cyber security pandemic – ransomware that can spread its infection like a traditional worm. The results were catastrophic, with some damage estimates reaching up to more than $4 billion. […]

Post Tagged with ,
Read More

Okta Extends Canadian Presence with New Downtown Toronto Office

Post Image

Okta Extends Canadian Presence with New Downtown Toronto Office Okta, Inc., the leading independent provider of identity for the enterprise, today announced the opening of its new Canadian office in downtown Toronto. With the new office, Okta will tap into the area’s diverse high-technology talent pool to grow its engineering team, and create proximity to […]

Post Tagged with ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event

Post Image

Cloud Identity Summit Announces Record-Breaking Attendance at 2017 Event Cloud Identity Summit (CIS), the world’s premier identity conference, today announced highlights of the 2017 event and plans for the next iteration of Cloud Identity Summit, to be called “Identiverse” 2018 in Boston. More than 1,500 attendees shared their perspectives on rapidly evolving trends and best […]

Post Tagged with ,
Read More