Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Steps to a successful IAMG project

Post Image

Steps to a successful IAMG project It is becoming increasingly important that organisations constantly manage and control employee access to information and systems within the organisation. Philip Yazbek, industrial psychologist from consulting firm Bizmod, says that the responsibility of governing and protecting information and data lies with the organisation, and as such an identity access […]

Post Tagged with
Read More

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications

Post Image

Kantara Initiative Releases User-Managed Access Version 2.0 Specifications The Kantara Initiative formally announced today the approval and publication of the User-Managed Access (UMA) Version 2.0 (UMA 2.0) technical specifications. UMA 2.0 offers significant enhancements to the established global standard bringing user consent, control and trust into easier reach for organizations processing personal data. UMA is […]

Post Tagged with ,
Read More

Startup Profile: Identity — manage customers’ logs and get realtime updates online

Post Image

Startup Profile: Identity — manage customers’ logs and get realtime updates online Identity is a cloud-based customers/visitors management software which aims to eradicate the use of paper logs in offices and promote electronic means. Launched on December 4, 2017, by Saheed Ajibulu (Team Lead) and Olagoke Okebukola (Chief Technical Officer), the web application helps visitors […]

Post Tagged with
Read More

How to configure and use Amazon’s free IAM service

Post Image

How to configure and use Amazon’s free IAM service Amazon Web Services has a built-in service that controls access to AWS resources. This service, called IAM (Identity and Access Management), allows administrators to control who, what, and where any given user can perform an action in a resource. The following list contains all the key […]

Post Tagged with , ,
Read More

Webinar: Protect Privileged Active Directory Credentials Using a Tiered-Administrative Model

Post Image

Webinar: Protect Privileged Active Directory Credentials Using a Tiered-Administrative Model In this webinar, Russell Smith will show you how to plan your Active Directory and manage access to domain controllers to minimize the risk of exposing privileged credentials. Tune into this webinar and learn how to: -Separate servers and administrator accounts into Microsoft’s three tiers […]

Post Tagged with
Read More

One Identity UNITE Partner and User Conference

Post Image

One Identity UNITE Partner and User Conference 9-12 April 2018 | Nice, France Benefits to customer and partner attendees: -Gain valuable industry insights -Learn best practices and tips and tricks to improve technical proficiency and knowledge -Direct access to product development, product managers, product marketing and subject matter experts -Network with your peers -Be heard […]

Post Tagged with , ,
Read More

The new role of identity and authentication in the enterprise

Post Image

The new role of identity and authentication in the enterprise Identity and access management, preference management, and the role of secure internal and external API stores are becoming essential in the workplace. Financial institutions can use these technologies to confirm identity regarding payments and loans. Other companies can use them to provide access to social […]

Post Tagged with ,
Read More

Web Based User Management Platform

Post Image

Web Based User Management Platform The concept of web based user management has caught the attention of IT admins around the world. This is because traditional user management platforms have historically been complicated on-prem solutions like Microsoft® Active Directory® (AD) or OpenLDAP™. Nevertheless, as more IT resources shift to the cloud, more IT organizations are […]

Post Tagged with
Read More

BeyondTrust Introduces First-of-its Kind Solution to Protect Critical Network, IoT, ICS, and SCADA Devices from Privilege-based Attacks

Post Image

BeyondTrust Introduces First-of-its Kind Solution to Protect Critical Network, IoT, ICS, and SCADA Devices from Privilege-based Attacks BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, today announced a first-of-its kind privilege management solution for network, IoT, ICS, and SCADA devices. PowerBroker for Networks rounds out BeyondTrust’s privilege management […]

Post Tagged with ,
Read More

One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA

Post Image

One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA Description: Authenticate with RADIUS 2FA workflow fails during authentication with two-step RADIUS server. Read more at – One Identity Password Manager 5.7.1 Public Hotfix for Azure MFA

Post Tagged with , ,
Read More