Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification

Post Image

SailPoint Successfully Completes ISO/IEC 27001:2013 Certification SailPoint Technologies Holdings, Inc., the leader in enterprise identity governance, today announced it has completed two information security assessments for IdentityNowTM, SailPoint’s SaaS-based identity solution. SailPoint successfully completed an ISO/IEC 27001:2013 certification and obtained a SOC 2® Type 2 report with an unqualified opinion for IdentityNow controls relative to […]

Post Tagged with , ,
Read More

Entersekt Partners With ForgeRock

Post Image

Entersekt Partners With ForgeRock Entersekt, a pioneer in mobile-first authentication and e-commerce enablement, announced today that it has joined the ForgeRock Trust Network as a principal technology partner. ForgeRock is a leading provider of identity and access management solutions to a wide range of industries, including financial services, retail, healthcare, higher education, and communications, in […]

Post Tagged with ,
Read More

One Identity Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location

Post Image

One Identity Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location Password Manager 5.7.1 Public Hotfix for Solution 240434 – Dictionary rule does not work when SYSVOL folder is not in the default location. Read more at – One Identity Password […]

Post Tagged with , ,
Read More

Microsoft, the ID2020 Alliance, universal digital identification and you

Post Image

Microsoft, the ID2020 Alliance, universal digital identification and you Last year Microsoft joined ID2020, a global Alliance whose goal is to create universal digital identities for everyone. What are the social, economic and ethical implications of such an initiative? Our digital activity increasingly parallels our real-world activity. Participation in the modern economy, the ability to […]

Read More

Optimal IdM Announces Customer Support for GDPR

Post Image

Mistaken Identity: Clear Eyes, Full Data, Can’t Lose Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR). Taking effect in May of 2018, GDPR will require global organizations to control, process and protect […]

Post Tagged with ,
Read More

Sailpoint Audio Conference: Mistaken Identity: Clear Eyes, Full Data, Can’t Lose

Post Image

Sailpoint Audio Conference: Mistaken Identity: Clear Eyes, Full Data, Can’t Lose Ok, so you have the largest data lake in the hemisphere, but now what do you do with it? David Lee and Mike Kiser welcome Gianni Aiello to explore how big data can be triaged even while the first few rounds of analytics begin […]

Post Tagged with ,
Read More

Easy IAM security best practices for a more secure AWS Cloud

Post Image

Easy IAM security best practices for a more secure AWS Cloud The focus of this article is on how you can do a couple of simple tasks that will bolster IAM security, which you can apply to your AWS cloud. Some of these actions are: – Removing the root access keys – Using users and […]

Post Tagged with ,
Read More

Establishing Trust With Identity Governance Intelligence

Post Image

Establishing Trust With Identity Governance Intelligence Many organizations do not keep well-documented records of where all their data is housed. This is a serious problem with so many new regulations requiring companies to be more accountable for protecting information. Does your organization know exactly who its users are, what they’re entitled to access and where […]

Post Tagged with ,
Read More

Steps to a successful IAMG project

Post Image

Steps to a successful IAMG project It is becoming increasingly important that organisations constantly manage and control employee access to information and systems within the organisation. Philip Yazbek, industrial psychologist from consulting firm Bizmod, says that the responsibility of governing and protecting information and data lies with the organisation, and as such an identity access […]

Post Tagged with
Read More

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications

Post Image

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications The Kantara Initiative formally announced today the approval and publication of the User-Managed Access (UMA) Version 2.0 (UMA 2.0) technical specifications. UMA 2.0 offers significant enhancements to the established global standard bringing user consent, control and trust into easier reach for organizations processing personal data. UMA is […]

Post Tagged with ,
Read More