Call us 

Discovering Identity and Access

Management Solutions

Has ForgeRock Betrayed Its Community?

Post Image

Has ForgeRock Betrayed Its Community? One of the fundamental freedoms open source is being able to change to another supplier if the original one stops being useful – overcharging, acquired by a toxic owner, development terminated, and so on. Forgerock is a company that used the open source freedoms of Sun’s identity management software to […]

Post Tagged with ,
Read More

The NotPetya Global Pandemic – CyberArk Labs Analysis

Post Image

The NotPetya Global Pandemic – CyberArk Labs Analysis In May 2017, WannaCry took advantage of an exploit in the Windows operating system to usher in a cyber security pandemic – ransomware that can spread its infection like a traditional worm. The results were catastrophic, with some damage estimates reaching up to more than $4 billion. […]

Post Tagged with ,
Read More

Okta Extends Canadian Presence with New Downtown Toronto Office

Post Image

Okta Extends Canadian Presence with New Downtown Toronto Office Okta, Inc., the leading independent provider of identity for the enterprise, today announced the opening of its new Canadian office in downtown Toronto. With the new office, Okta will tap into the area’s diverse high-technology talent pool to grow its engineering team, and create proximity to […]

Post Tagged with ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Five Ways Identity Reduces Costs to Healthcare Providers

Post Image

Five Ways Identity Reduces Costs to Healthcare Providers Identity governance also offers a powerful value proposition to providers in the form of cost reduction. This is especially appealing when you consider that U.S. hospitals earn on average single-digit margins (Chart A). The American Hospital Association further reports that many providers operate in the negative. Through […]

Post Tagged with , , ,
Read More

Multi-Factor Authentication with Oracle Identity Cloud Services

Post Image

Multi-Factor Authentication with Oracle Identity Cloud Services The Multi-Factor Authentication part I post described the initial MFA configuration, the enrollment process and second factor authentication with the Mobile Authenticator One-Time Password. In this second post, we will go over the other factors: security questions, notifications, text messages and bypass code – and the additional security […]

Post Tagged with ,
Read More

Hitachi ID Announces Major Release of its IAM Suite: v10.1

Post Image

Hitachi ID Announces Major Release of its IAM Suite: v10.1 Hitachi ID Systems is pleased to announce the availability of a significant new version of its Identity and Access Management Suite. The v10.1 release introduces important new features and completely redesigned user interfaces. This release cements Hitachi ID’s IAM suite as a very user-friendly, practical […]

Post Tagged with ,
Read More

ProofID and PEGRight Merge to Create £18m ($23M) International IAM Company

Post Image

ProofID and PEGRight Merge to Create £18m ($23M) International IAM Company ProofID Ltd, a Manchester-based provider of Identity Management (IDM) technology solutions and U.S.-based PEGRight Inc, an Identity and Access Management (IAM) specialist have announced their merger. The $5m transaction will immediately increase group turnover by 50 percent to over £6m with the number of […]

Post Tagged with ,
Read More

How to set up two-factor authentication for enterprise users

Post Image

How to set up two-factor authentication for enterprise users The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT’s mobile security arsenal and learn how to set it up. Two heads are better than one, and the same is true when it comes to verifying end-user […]

Post Tagged with , ,
Read More

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio

Post Image

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio Fujitsu today announces that it is broadening its advanced biometric security solutions portfolio through an agreement with ImageWare Systems, (OTCQB:IWSY), to resell key security capabilities including enterprise mobile biometric user authentication as a service. The agreement will see Fujitsu not only extend its biometric […]

Post Tagged with ,
Read More