Call us 

Discovering Identity and Access

Management Solutions

Identity Management Posts

Multi-Factor Authentication with Oracle Identity Cloud Services

Post Image

Multi-Factor Authentication with Oracle Identity Cloud Services The Multi-Factor Authentication part I post described the initial MFA configuration, the enrollment process and second factor authentication with the Mobile Authenticator One-Time Password. In this second post, we will go over the other factors: security questions, notifications, text messages and bypass code – and the additional security […]

Post Tagged with ,
Read More

Hitachi ID Announces Major Release of its IAM Suite: v10.1

Post Image

Hitachi ID Announces Major Release of its IAM Suite: v10.1 Hitachi ID Systems is pleased to announce the availability of a significant new version of its Identity and Access Management Suite. The v10.1 release introduces important new features and completely redesigned user interfaces. This release cements Hitachi ID’s IAM suite as a very user-friendly, practical […]

Post Tagged with ,
Read More

ProofID and PEGRight Merge to Create £18m ($23M) International IAM Company

Post Image

ProofID and PEGRight Merge to Create £18m ($23M) International IAM Company ProofID Ltd, a Manchester-based provider of Identity Management (IDM) technology solutions and U.S.-based PEGRight Inc, an Identity and Access Management (IAM) specialist have announced their merger. The $5m transaction will immediately increase group turnover by 50 percent to over £6m with the number of […]

Post Tagged with ,
Read More

How to set up two-factor authentication for enterprise users

Post Image

How to set up two-factor authentication for enterprise users The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT’s mobile security arsenal and learn how to set it up. Two heads are better than one, and the same is true when it comes to verifying end-user […]

Post Tagged with , ,
Read More

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio

Post Image

Fujitsu Signs Agreement with ImageWare to Extend Biometric Security Solutions Portfolio Fujitsu today announces that it is broadening its advanced biometric security solutions portfolio through an agreement with ImageWare Systems, (OTCQB:IWSY), to resell key security capabilities including enterprise mobile biometric user authentication as a service. The agreement will see Fujitsu not only extend its biometric […]

Post Tagged with ,
Read More

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide

Post Image

CA Technologies Positioned as a Leader in Gartner Magic Quadrant for Access Management, Worldwide Gartner, Inc. has named CA Technologies (NASDAQ:CA) a Leader in the Gartner Magic Quadrant for Access Management, Worldwide 2017.* The report evaluated CA’s broad identity and access management portfolio and the company’s ability to execute and completeness of vision. “Access managers […]

Post Tagged with ,
Read More

Entrust Datacard Creates the Modern Authentication Solution with the Introduction of IntelliTrust Authentication Service

Post Image

Entrust Datacard Creates the Modern Authentication Solution with the Introduction of IntelliTrust Authentication Service Entrust Datacard, a leading provider of trusted identity and secure transaction technology solutions, today announced the launch of IntelliTrust authentication service – its new authentication cloud service with Mobile Smart Credential technology. This powerful, advanced adaptive authentication solution leverages the low […]

Post Tagged with
Read More

Identity Defined Security Alliance Launches New Initiatives to Help CISOs Better Protect Mobile and Cloud Enterprises

Post Image

Identity Defined Security Alliance Launches New Initiatives to Help CISOs Better Protect Mobile and Cloud Enterprises The Identity Defined Security Alliance (IDSA), an organization dedicated to helping enterprises keep their data secure and accessible to the right people at the right time, today announced a series of new actions and initiatives aimed at helping CISOs […]

Post Tagged with ,
Read More

Identity Management Metrics your Board of Directors Will Care About

Post Image

Identity Management Metrics your Board of Directors Will Care About We are living in the age of the data breach. There were more significant data breaches this year than ever before—873, according to a report from the Identity Theft Resource Center. In many of these high profile breaches, hackers used weak identity management policies as […]

Post Tagged with , ,
Read More

Centrify targets local admin access on Macs through latest identity management update

Post Image

Centrify targets local admin access on Macs through latest identity management update Macs in the enterprise are prone to careless administrative account maintenance and passwords are being shared further than they should be, according to Centrify. According to the company, it is common for organisations to put administrative passwords on Macs and use the same […]

Post Tagged with ,
Read More