Call us 

Discovering Identity and Access

Management Solutions

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution

Post Image

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution -SailPoint, the leader in enterprise identity management, today announced extended market traction for IdentityNow, the industry’s most complete cloud-based identity governance solution. IdentityNow is the fastest growing segment of SailPoint’s business with its customer footprint growing 50 percent in the past year. SailPoint also unveiled […]

Post Tagged with , ,
Read More

Aware Introduces Indigo|Onboard, A Cloud-Based Biometric Identity Solution For Better Onboarding

Post Image

Aware Introduces Indigo|Onboard, A Cloud-Based Biometric Identity Solution For Better Onboarding Aware, Inc., a leading global provider of biometrics software and solutions, today introduced Indigo|Onboard™, the first in Aware’s new Indigo™ family of cloud-based solutions that deliver turnkey biometric search functionality either as a software-as-a-service (SaaS) subscription or as a server-based software license. Indigo|Onboard™ is […]

Post Tagged with , ,
Read More

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution

Post Image

SailPoint Extends Market Traction for Its SaaS Identity Governance Solution SailPoint, the leader in enterprise identity management, today announced extended market traction for IdentityNow, the industry’s most complete cloud-based identity governance solution. IdentityNow is the fastest growing segment of SailPoint’s business with its customer footprint growing 50 percent in the past year. SailPoint also unveiled […]

Post Tagged with , ,
Read More

PistolStar, Inc. Engineers Release PortalGuard v5.6

Post Image

PistolStar, Inc. Engineers Release PortalGuard v5.6 PistolStar, Inc. flagship product PortalGuard has been updated to version 5.6.0.0 by adding several new features to enhance the end user experience. PistolStar, Inc. is committed to being on the cutting edge of trends and guidelines in the authentication management industry. PortalGuard is continuously evolving to meet these demands. […]

Post Tagged with ,
Read More

Boldon James and STEALTHbits Partner to Solve Critical Gaps in Data Loss Prevention (DLP) and Identity and Access Management (IAM) Programs

Post Image

Boldon James and STEALTHbits Partner to Solve Critical Gaps in Data Loss Prevention (DLP) and Identity and Access Management (IAM) Programs QinetiQ’s data security company Boldon James, the leading specialist provider of data classification and secure messaging solutions, and STEALTHbits Technologies, Inc., a leading cybersecurity company focused on protecting credentials and data, today announced the […]

Post Tagged with ,
Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with
Read More

How identity management systems strengthen cybersecurity readiness

Post Image

How identity management systems strengthen cybersecurity readiness Identity management, sometimes called identity and access management (IAM), is much more than simply providing users with logon capabilities to a system or network. Identity management is one of the fundamental cybersecurity objectives outlined in part one of this series that can help enterprises achieve a state of […]

Post Tagged with ,
Read More

Start redrawing your identity and access management roadmap

Post Image

Start redrawing your identity and access management roadmap Retro can be fun, but when it comes to roadmaps, you want the latest in GPS technology. And if new tech is best for secure trip planning, it’s doubly useful for keeping your enterprise systems and data secure. A key tool for reaching a secure destination is […]

Post Tagged with ,
Read More

Microsoft Enhances External User Collaboration with Azure AD B2B

Post Image

Microsoft Enhances External User Collaboration with Azure AD B2B Microsoft today announced the general availability of its Azure Active Directory (AD) B2B Collaboration feature set. As its name suggests, the toolkit, also part of the company’s Enterprise Mobility + Security offering, enables business-to-business collaboration while enhancing security and preventing leaks of sensitive data. Azure AD […]

Post Tagged with ,
Read More

How do identity governance and access management systems differ?

Post Image

How do identity governance and access management systems differ? Giving proper rights to data is imperative when it comes to securing sensitive information and performing access management. Access management is the process by which a company identifies, tracks and controls which users have access to a particular system or application. Access management systems are more […]

Post Tagged with , ,
Read More