Call us 

Discovering Identity and Access

Management Solutions

With Password Logins Proving Inefficient, What Trajectory Is Identity Management and User Account Security on in 2017?

Post Image

With Password Logins Proving Inefficient, What Trajectory Is Identity Management and User Account Security on in 2017? We’ve had the humble password as a tool to login into our personal accounts on different services for the best part of twenty years and similar to a safe, it is a security measure that makes sure only […]

Post Tagged with
Read More

Preventing trusted users from misusing their privileges

Post Image

Preventing trusted users from misusing their privileges Users with privileged accounts have the ability to make critical changes to your enterprise system. Find out how to control trusted users and prevent malicious actions. “Every organization, no matter what size, will have some employees who have superuser powers. These are the people whose user accounts have […]

Post Tagged with ,
Read More

IAM a core building block for GDPR compliance

Post Image

IAM a core building block for GDPR compliance Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole. A strong indemnity and access management (IAM) strategy is an important element of any programme to prepare organisations to […]

Post Tagged with ,
Read More

The Great Identity/Authentication Confusion

Post Image

The Great Identity/Authentication Confusion At this year’s PYMNTS Innovation Project, Admiral James Stavridis, NATO’s former Supreme Commander, said that one of the biggest points of compromise that cybercrooks exploit is the login. And that for far too long, more focus has been placed on password security and management — accessing information — rather than on […]

Post Tagged with , ,
Read More

New lieberman software + sailpoint integration manages both regular and privileged user identities in a unified approach

Post Image

New lieberman software + sailpoint integration manages both regular and privileged user identities in a unified approach Lieberman Software Corporation today announced a new product integration with SailPoint IdentityIQ. The interoperable solution integrates Lieberman Rapid Enterprise Defense (RED) Identity Management — formerly known as Enterprise Random Password Manager — with SailPoint’s IdentityIQ™. With this integration, […]

Post Tagged with ,
Read More

Discover the 32.7% CAGR for privileged identity management market global forecast to 2021

Post Image

Discover the 32.7% CAGR for privileged identity management market global forecast to 2021 The privileged identity management market size is expected to grow from USD 922.0million in 2016 to USD 3,792.5million by 2021, at a Compound Annual Growth Rate (CAGR) of 32.7%. Identity management and access management are among the applications contributing to the growth […]

Read More

CyberArk and ATOS launch PAM service

Post Image

CyberArk and ATOS launch PAM service CyberArk and ATOS have announced a joint offering around PAM (Privileged Access Management). ATOS is offering customers a PAM managed security services based on the CyberArk Privileged Account Security Solution. The goal is to stop attacks that target users who have high levels of privileges on the corporate network. […]

Post Tagged with , ,
Read More

Tools4ever Publishes New eBook on Account and Password Management in Education

Post Image

Tools4ever Publishes New eBook on Account and Password Management in Education Tools4ever, a market leader in identity governance and administration (IGA), has published a new eBook on identity and access management in education. The eBook discusses many of the common account management and password issues that the education industry faces every day and several ways […]

Post Tagged with ,
Read More

MFA vs. Adaptive Authentication: What should you choose?

Post Image

MFA vs. Adaptive Authentication: What should you choose? An absolute nightmare for an IT security professional is when protected data is accessed by unauthorized personnel. While passwords, firewalls and other basic protection methods are becoming easily ‘hackable’, organizations are seen shifting towards Multi-Factor Authentication (MFA), which includes voice callbacks, SMSes and OTPs, to combat the […]

Read More