Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Mecosta County Medical Center Creates Identity and Access Management Infrastructure

Care Facility Uses DigitalPersona Fingerprint Biometrics to Create Unique User Identities, Provide Employees with “Follow-Me Desktop” using VMware VDI. DigitalPersona, Inc., a global provider of multi-factor authentication and access management solutions, today announced that Mecosta County Medical Center (MCMC) has deployed DigitalPersona® Pro software and U.are.U® Fingerprint Readers as the foundation for a new identity […]

Read More

ISX Select SpyLogix for Cloud Security

IdentityLogix, an innovator in continuous security intelligence and real-time data actualization, announces a strategic partnership with Atlanta-based Information Security Xperts, Inc. (ISX). ISX has selected SpyLogix Enterprise™ technology for its Cloud Identity and Access Management (IAM) offerings. ISX specializes in identity and access solutions based on CA Technologies software. The partnership will enable customers to […]

Read More

WSO2 Software Architect to Speak About Cloud Identity Management at KuppingerCole European Identity & Cloud Conference 2012

WSO2 today announced that Prabath Siriwardena, WSO2 software architect and chair of WSO2’s integration technologies management committee, will speak as a panelist at the KuppingerCole European Identity & Cloud Conference 2012. The session, “Extending Your Identity and Access Management into the Cloud,” is part of the event’s Cloud Identity and Access track on Wednesday, April […]

Read More

Innovators in networking and security, create new approach to securing networks based on Identity

BlackRidge Technology, the Identity network company, today introduced the launch of its innovative Identity Aware Networking solution, BlackRidge Eclipse(TM). BlackRidge Eclipse is designed to provide innovative, proactive protection to network resources by preventing attackers from performing reconnaissance of high-value and mission-critical network assets, and by denying them the ability to communicate anonymously. “Enterprises have long […]

Read More

Tivoli Identity Management -Effectively Managing a Company’s Security

These days, with the digital world evolving at the pace it does, the identity management demands put forth by a large number of companies heavily exceed what most management systems are capable of offering. There are too many companies out there who a few years ago only needed to manage a few thousand people whereas […]

Read More

The Foundational Role of Identity in a Personal Cloud

If we’re to build personal clouds supported by a cloud operating system (COS), then we need to understand the key services that the COS would provide to the user. Operating systems are not monolithic pieces of software, but rather interlocking collections of services. One of the most important things to figure out is how a […]

Read More

Cloud Identity management for e-Healthcare

Right now the Canadian government is working on creating a strategy for cloud adoption within various government agencies. There are a lot of great benefits to centralizing and updating public services, but the minute you move to a distributed type of environment, there are suddenly many more security factors that must be taken into account. […]

Read More

DoD to use iris scans, fingerprints for building security

The Defense Department is preparing two large scale tests to prove whether biometrics can control who enters military facilities without impeding the flow of traffic. For more than a decade, DoD has used fingerprints, iris scans and facial recognition technology to detect terrorists in Afghanistan, Iraq and in other countries. But as an approach to […]

Read More

Courion among leaders advocating SCIM standard for cloud-based identity and access management

Courion Corporation, the leader in identity and access management (IAM) for access risk, last week helped demonstrate interoperability of products using the new SCIM (Simple Cloud Identity Management) specification for cloud-based identity management. Courion demonstrated the company’s capabilities to support SCIM as both a client and server at the SCIM Interop event held at the […]

Read More

Ping Identity Launches Certified Service Partner Program

Ping Identity®, The Cloud Identity Security Leader™, today announced its Certified Service Partner Program. Over the last three months Ping Identity has certified 35 consultants from 11 North American service partners including Amerindia, Bluewolf, Commoveo, CSC, CTI, GuidePoint Security, Insyndia, KPMG, Seros, Solstice and OnWire Consulting. By becoming a Ping Identity Certified Service Partner, organizations […]

Read More