Call us 

Discovering Identity and Access

Management Solutions

Oracle announces enhanced cloud security offerings

Post Image

Oracle announces enhanced cloud security offerings Oracle has announced improvements to cloud security services, leveraging the company’s advances in machine learning and artificial intelligence (AI). The new services include the addition of Adaptive Access to the Oracle Identity Cloud service, automated threat detection in Oracle software-as-a-service (SaaS) solutions, and advanced risk monitoring using machine learning […]

Post Tagged with ,
Read More

CA Strong Authentication offers businesses low-cost MFA and 2FA

Post Image

CA Strong Authentication offers businesses low-cost MFA and 2FA CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft. CA Technologies’ Strong Authentication product is a multifactor authentication product that adds additional security measures — using biometrics and smartphones — to standard username/password logins for […]

Post Tagged with , ,
Read More

Identity management for mobile users

Post Image

Identity management for mobile users If you’re like most IT professionals – or even ordinary civilians – you own two or more mobile devices in addition to your laptop. The ordinary civilian, however, doesn’t necessarily know how to lock down his or her device and keep its data secure. As IT professionals, we can use […]

Post Tagged with ,
Read More

Blockchain Identity Solution Encrypts Info of All Involved

Post Image

Blockchain Identity Solution Encrypts Info of All Involved In a statement, Netki CEO Justin Newton explained that the Netki Digital ID system is meant to help meet the “global legal and compliance requirements” that blockchain transaction auditing must address. To that end, the company says it enables the capture of end users “documents and biometrics […]

Post Tagged with ,
Read More

Start redrawing your identity and access management roadmap

Post Image

Start redrawing your identity and access management roadmap Retro can be fun, but when it comes to roadmaps, you want the latest in GPS technology. And if new tech is best for secure trip planning, it’s doubly useful for keeping your enterprise systems and data secure. A key tool for reaching a secure destination is […]

Post Tagged with ,
Read More

Best Practice Approach for Planning your IAM Project

Post Image

Best Practice Approach for Planning your IAM Project Traditionally, Identity Management projects have been seen as complex, expensive and never-ending. Many people are looking to the Cloud to simplify identity management. Whilst the Cloud can introduce speed and agility into an IAM project, there are still fundamental challenges which must be addressed. The Cloud can […]

Post Tagged with ,
Read More

Dashlane Announces Spaces For Mobile Business Password Management

Post Image

Dashlane Announces Spaces For Mobile Business Password Management Dashlane, the award-winning password manager and leader in identity and access management, announces the release of Spaces for mobile. This versatile feature allows employees to use their business and personal passwords on mobile devices by toggling between dedicated work and personal Spaces™ within Dashlane. Companies and employees […]

Post Tagged with , ,
Read More

Evolving a Right IAM Strategy for Mobile Banking

Post Image

Evolving a Right IAM Strategy for Mobile Banking In the current business scenario, app-driven mobile activities emphasize the need for Identity and Access Management (IAM) – capabilities that could be delivered to both mobile devices as well as mobile apps. Integrating IAM for mobile users bridges the gap between device endpoint and Enterprise IAM. This […]

Post Tagged with ,
Read More

6 Ways to Make IAM Work for Third-Party Organizations

Post Image

6 Ways to Make IAM Work for Third-Party Organizations ssuing one-time password (OTP) tokens to third-party organizations to provide privileged remote access to your network can lead to a data security disaster, warned research director Felix Gaehtgens at the Gartner Identity and Access Management (IAM) Conference in London earlier this month. “For employees or contractors […]

Post Tagged with ,
Read More

Webinar: Improve Security While Cutting Costs

Post Image

Webinar: Improve Security While Cutting Costs Join this webinar to hear about the challenges with SSO-only approaches to security, what to look for in the right Identity-as-a-Service solution, and how to reduce operational costs with a user-centric approach. Improve Security While Cutting Costs Date: Thursday, January 21 Time: 11am EST / 10am CST / 4pm […]

Post Tagged with , ,
Read More