Call us 

Discovering Identity and Access

Management Solutions

Identity Management Posts

Sailpoint Webinar – Accelerate Compliance with Comprehensive Identity Governance

Post Image

Sailpoint Webinar – Accelerate Compliance with Comprehensive Identity Governance Date: Wednesday, November 8 Time: 10am PT | 12pm CT | 1pm ET By implementing a comprehensive identity governance strategy across all systems and files you can prepare for GDPR while also improving your security posture. Join this webinar to learn more about how a comprehensive […]

Post Tagged with , ,
Read More

VASCO IDENTIKEY Authentication Server and a look at its key features

Post Image

VASCO IDENTIKEY Authentication Server and a look at its key features The IDENTIKEY Authentication Server, which includes multifactor authentication software tools and DIGIPASS tokens offered by VASCO Data Security International Inc., adds additional security measures to standard username/password logins across a wide range of servers and services. This stops unauthorized logins, even when passwords have […]

Post Tagged with , ,
Read More

Quest Defender protects businesses with two-factor authentication

Post Image

Quest Defender protects businesses with two-factor authentication Defender by Quest Software Inc. is a two-factor authentication tool that adds additional security measures to standard username/password logins for a variety of servers and services using biometrics and smartphone devices. Defender came into the Dell fold when the company acquired Quest Software. Dell has since spun out Quest and […]

Post Tagged with ,
Read More

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network

Post Image

One Identity Research Exposes Major Problem with Employees Snooping on the Corporate Network One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today released new global research revealing that the overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major “snooping” […]

Post Tagged with
Read More

OneTrust Launches First-to-Market Data Subject Access Request (DSAR) Portal to Simplify GDPR Compliance

Post Image

OneTrust Launches First-to-Market Data Subject Access Request (DSAR) Portal to Simplify GDPR Compliance OneTrust, a global leader in enterprise privacy management software that supports compliance with data privacy regulations like the EU General Data Protection Regulation (GDPR), today announces the launch of the OneTrust Data Subject Access Request (DSAR) Portal. Data subjects include customers, employees, […]

Post Tagged with
Read More

Triptic Integrates Tools4ever’s Cloud-Based SSO Portal, HelloID, With Iris Intranet

Post Image

Triptic Integrates Tools4ever’s Cloud-Based SSO Portal, HelloID, With Iris Intranet Tools4ever, a worldwide market leader in providing access governance software and solutions, and triptic, supplier of social intranet solution Iris Intranet, are excited to announce a new, far-reaching partnership. The integration of both solutions offers employees a comprehensive application launcher — providing access to all […]

Post Tagged with ,
Read More

Executives tell us their password security best practices

Post Image

Executives tell us their password security best practices To mark October as Cyber Security Awareness month, we asked leaders in our community this question: Data breaches containing password information have become a regular occurrence. At the beginning of October, Yahoo revealed that its 2013 data breach affected 3 billion accounts, with not only passwords, but […]

Post Tagged with , ,
Read More

Why is the mobile identity management market growing exponentially?

Post Image

Why is the mobile identity management market growing exponentially? Mobile identity management is an approach that can address both usability and trust concerns in mobile business. It has been a fundamental service for the next-generation mobile telecommunications infrastructure. Mobile identity management is used to identify, acquire, access, and pay for services that follow the user […]

Post Tagged with
Read More

Atos’ Enterprise SSO as-a-Service brings password-free logins to both Cloud and on-premises applications

Post Image

Atos’ Enterprise SSO as-a-Service brings password-free logins to both Cloud and on-premises applications Atos, a global leader in digital transformation, launches Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS), through Bull, its brand for HPC and cybersecurity products. This is the only solution on the market that enables users to access their applications, without the need […]

Post Tagged with ,
Read More

Windows Server 2016: Understanding Microsoft’s Enhanced Security Administrative Environment

Post Image

Windows Server 2016: Understanding Microsoft’s Enhanced Security Administrative Environment It is no secret that security is a major headache for organizations in today’s Internet-connected landscape but securing existing production Active Directory (AD) forests can be difficult for two reasons. In many cases, production forests may already be compromised. And the only way to be sure […]

Post Tagged with
Read More