Call us 

Discovering Identity and Access

Management Solutions

Insecure OAuth implementations: How are mobile app users at risk?

Post Image

Insecure OAuth implementations: How are mobile app users at risk? OAuth 2.0 is an open standard for token-based authorization that allows a user’s account information to be accessed by third-party services, without sharing or exposing the user’s credentials. It’s widely used to facilitate single sign-on (SSO), so users can sign in to third-party websites and […]

Post Tagged with , ,
Read More

Customer identity management has a big impact on customer experience

Post Image

Customer identity management has a big impact on customer experience Customer Identity and Access Management is a bulky phrase, but the problems it tackles are real. Digital identity management has a direct impact on customer experience – and many older CRM systems are not up for the job. Barb Mosher Zinck explains how CX and […]

Post Tagged with ,
Read More

Addressing Security Threat to be Prime Capitalizing Aspect

Post Image

Addressing Security Threat to be Prime Capitalizing Aspect Identity and access management refers to a security discipline and also a particular framework that includes and supports the technology needed for managing electronic identities. It has become imperative for institutions and organizations to have vigilance over their systems and protect user for addressing risks and fortifying […]

Post Tagged with ,
Read More

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform

Post Image

Migration Guide: CA Single Sign-On to the ForgeRock Identity Platform The Identity and Access Management (IAM) landscape has drastically changed in recent years. Legacy IAM products like CA Single Sign-On® (formerly known as CA SiteMinder®) lack the flexibility to scale beyond traditional IAM scenarios. The guide will provide you with: – A comparison of differences […]

Post Tagged with , ,
Read More

Set up an identity and access management system for public cloud

Post Image

Set up an identity and access management system for public cloud Clouds are distributed systems with many moving parts that all work independently. There are resources, such as storage and compute systems, as well as more fine-grained services, such as APIs. Admins need to track user activity within these systems, including the use of all […]

Post Tagged with ,
Read More

Identity, authentication and authorisation becoming risk-led

Post Image

Identity, authentication and authorisation becoming risk-led Identity management, and authentication and authorisation governance are shifting away from being purely IT initiatives, according to RSA. Traditionally, initiatives around identity, authentication and authorisation have been about becoming more efficient and enabling faster provisioning. Read more at – Identity, authentication and authorisation becoming risk-led

Post Tagged with ,
Read More

Webinar:Deploying Multi-factor Authentication in Your Enterprise

Post Image

Webinar:Deploying Multi-factor Authentication in Your Enterprise Date: Thursday, June 08, 2017 Time: 12:00 PM Eastern Daylight Time Duration: 1 hour Multi Factor Authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties […]

Post Tagged with
Read More

Identity Management Service Okta Receives FedRAMP Certification

Post Image

Identity Management Service Okta Receives FedRAMP Certification Cloud identity management provider Okta has received FedRAMP certification with Department of Justice sponsorship, meeting compliance requirements of more than 300 controls. “FedRAMP is considered the gold standard, with the most stringent set of security controls for cloud companies,” said Mark Settle, CIO at Okta. “Okta’s achievement of […]

Post Tagged with ,
Read More

Identropy and Exabeam Partner to Improve Cyber Security

Post Image

Identropy and Exabeam Partner to Improve Cyber Security Identropy, a leading security consulting firm that specializes in advisory, implementation, and managed services for identity and access management (IAM) solutions today announced a new partnership with Exabeam, the market leader in Security Intelligence solutions, to deliver disruptive identity and analytics-driven customer solutions. Read more at – […]

Post Tagged with ,
Read More