Call us 

Discovering Identity and Access

Management Solutions

Entrust Datacard Creates the Modern Authentication Solution with the Introduction of IntelliTrust Authentication Service

Post Image

Entrust Datacard Creates the Modern Authentication Solution with the Introduction of IntelliTrust Authentication Service Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced the launch of IntelliTrust authentication service – its new authentication cloud service with Mobile Smart Credential technology. This powerful, advanced adaptive authentication solution leverages the low […]

Post Tagged with
Read More

Centrify targets local admin access on Macs through latest identity management update

Post Image

Centrify targets local admin access on Macs through latest identity management update Macs in the enterprise are prone to careless administrative account maintenance and passwords are being shared further than they should be, according to Centrify. According to the company, it is common for organisations to put administrative passwords on Macs and use the same […]

Post Tagged with ,
Read More

OneLogin Password Manager Hacked

Post Image

OneLogin Password Manager Hacked The identity and access management service OneLogin, which uses Amazon Web Services (AWS) to store customer data, recently announced that an attacker had “obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the U.S.” […]

Post Tagged with , ,
Read More

EY builds out IAM implementation with Open Windows Identity buy

Post Image

EY builds out IAM implementation with Open Windows Identity buy EY has snapped up Melbourne-based identity and access management company Open Windows Identity as it builds out its IAM implementation and managed services capability. EY says the move enables it to offer an integrated suite of cyber advisory services across Asia Pacific, from strategy to […]

Post Tagged with , ,
Read More

Oracle announces enhanced cloud security offerings

Post Image

Oracle announces enhanced cloud security offerings Oracle has announced improvements to cloud security services, leveraging the company’s advances in machine learning and artificial intelligence (AI). The new services include the addition of Adaptive Access to the Oracle Identity Cloud service, automated threat detection in Oracle software-as-a-service (SaaS) solutions, and advanced risk monitoring using machine learning […]

Post Tagged with ,
Read More

Insecure OAuth implementations: How are mobile app users at risk?

Post Image

Insecure OAuth implementations: How are mobile app users at risk? OAuth 2.0 is an open standard for token-based authorization that allows a user’s account information to be accessed by third-party services, without sharing or exposing the user’s credentials. It’s widely used to facilitate single sign-on (SSO), so users can sign in to third-party websites and […]

Post Tagged with , ,
Read More

Customer identity management has a big impact on customer experience

Post Image

Customer identity management has a big impact on customer experience Customer Identity and Access Management is a bulky phrase, but the problems it tackles are real. Digital identity management has a direct impact on customer experience – and many older CRM systems are not up for the job. Barb Mosher Zinck explains how CX and […]

Post Tagged with ,
Read More

Addressing Security Threat to be Prime Capitalizing Aspect

Post Image

Addressing Security Threat to be Prime Capitalizing Aspect Identity and access management refers to a security discipline and also a particular framework that includes and supports the technology needed for managing electronic identities. It has become imperative for institutions and organizations to have vigilance over their systems and protect user for addressing risks and fortifying […]

Post Tagged with ,
Read More

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform

Post Image

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform The Identity and Access Management (IAM) landscape has drastically changed in recent years. Legacy IAM products like CA Single Sign-On® (formerly known as CA SiteMinder®) lack the flexibility to scale beyond traditional IAM scenarios. The guide will provide you with: – A comparison of differences […]

Post Tagged with , ,
Read More