Call us 

Discovering Identity and Access

Management Solutions

RSA adds cloud-based identity assurance capabilities to SecurID Access

Post Image

RSA adds cloud-based identity assurance capabilities to SecurID Access Security technologies firm RSA has added a series of new capabilities for its RSA SecurID Access solution including a cloud-based authentication-as-a-service option. The cloud-based AaaS option delivers seamless access to both on-premises and cloud-based resources and systems, as well as additional dynamic, risk scoring functionality that […]

Post Tagged with , ,
Read More

Bytes launches game-changing, home-grown ‘as a service’ biometric solution

Post Image

Bytes launches game-changing, home-grown ‘as a service’ biometric solution Bytes Systems Integration has launched BioVault, an innovative cloud-based biometric solution. Nick Perkins, Divisional Director: Identity Management at Bytes, says the new service has been developed and hosted by Bytes to enable a broad range of financial services providers access to the power of biometrics – […]

Post Tagged with ,
Read More

How CEOs Can Drive Adoption of Identity and Access Management and Other Cybersecurity Programs

Post Image

How CEOs Can Drive Adoption of Identity and Access Management and Other Cybersecurity Programs By this point in our series on security and the CEO, it should be clear that security isn’t just a technological issue. It’s a cultural one, and you must improve your organization’s security culture, as well as its security processes and […]

Post Tagged with ,
Read More

OpenIAM Identity Manager Simplifies Management of Hybrid Microsoft Active Directory and Office365 Environments

Post Image

OpenIAM Identity Manager Simplifies Management of Hybrid Microsoft Active Directory and Office365 Environments OpenIAM introduces new functionality to its OpenIAM Identity Management solution to significantly simplify the administration of users and licenses for companies which need to manage both an on-premise Microsoft Active Directory and Exchange infrastructure as well as a Microsoft Office365 (O365) infrastructure. […]

Post Tagged with ,
Read More

Webinar: Understanding Proxy-Based Privileged Password/Session Management

Post Image

Understanding Proxy-Based Privileged Password/Session Management Privileged password management and privileged session management are both important security technologies getting a lot of attention right now as we look for ways to better protect the keys to the kingdom from mimikatz derivatives and all the other trends in play right now. It’s allow about sequestering privileged credentials […]

Read More

TOPdesk Announces Integration Partnership with OneLogin

Post Image

TOPdesk Announces Integration Partnership with OneLogin TOPdesk, one of the world’s largest and most widely recognized providers of IT service management software solutions, today announces its partnership with identity management provider OneLogin to provide single sign-on (SSO), external directory integration, and multi-factor authentication for TOPdesk’s clients. This partnership formalizes TOPdesk’s and OneLogin’s joint commitment to […]

Post Tagged with ,
Read More

Cybersecurity And Password Trends Around The World Do More Harm Than Good For Customers

Post Image

Cybersecurity And Password Trends Around The World Do More Harm Than Good For Customers It’s normally in the final seconds of a TV or radio interview that security experts get asked for advice for the general public – something simple, unambiguous, and universally applicable. It’s a fair question, and what the public want. But simple […]

Post Tagged with ,
Read More

How to handle privileged user management in the cloud

Post Image

How to handle privileged user management in the cloud Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control. Many enterprises are trying to secure the user accounts for various cloud applications and services their employees use, and with good reason: […]

Read More

Government ID Cards More Secure With Card Personalisation

Post Image

Government ID Cards More Secure With Card Personalisation It is estimated that more than 90 per cent of photo ID card inspections are undertaken visually and in the field, with visual inspections often being the primary form of document investigation and validation. Any decisions to use a secondary inspection criteria is often based on the […]

Post Tagged with , ,
Read More

Webinar: Active Directory Auditing 2017: Get the auditors off your back, in 1 hour or less

Post Image

Webinar: Active Directory Auditing 2017: Get the auditors off your back, in 1 hour or less Join Live: Thursday, May 18, 2017 | 10am PDT / 1pm EDT Nick Cavalancia _ bio.jpgw/ security expert and founder of Techvangelism, Nick Cavalancia If you’ve ever been audited, you know it’s less fun than pulling teeth. Increasingly more […]

Post Tagged with ,
Read More