Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: Authentication

CA Strong Authentication offers businesses low-cost MFA and 2FA

Post Image

CA Strong Authentication offers businesses low-cost MFA and 2FA CA Technologies’ Strong Authentication product is a multifactor authentication product that adds additional security measures — using biometrics and smartphones — to standard username/password logins for a variety of servers and services, such as Active Directory, Salesforce and the Outlook web app. Read more at – CA Strong Authentication offers businesses low-cost MFA […]

Post Tagged with , , ,
Read More

Okta Adaptive MFA gives companies flexible authentication

Post Image

Okta Adaptive MFA gives companies flexible authentication Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access.Unlike most of the other multifactor authentication (MFA) products, Okta Adaptive MFA is an MFA tool within the Okta Platform ecosystem that stems from single sign-on. […]

Post Tagged with , , ,
Read More

Identity, authentication and authorisation becoming risk-led

Post Image

Identity, authentication and authorisation becoming risk-led Identity management, and authentication and authorisation governance are shifting away from being purely IT initiatives, according to RSA. Traditionally, initiatives around identity, authentication and authorisation have been about becoming more efficient and enabling faster provisioning. Read more at – Identity, authentication and authorisation becoming risk-led

Post Tagged with ,
Read More

Unicon and Duo Security Collaborate to Develop Multifactor Authentication Extension for Shibboleth 3.x IDP

Unicon and Duo Security Collaborate to Develop Multifactor Authentication Extension for Shibboleth 3.x IDP Unicon, Inc., a leading IT consulting, services, and support provider specializing in open source for the education technology market, today announced that it has collaborated with Duo Security, a leading provider of two-factor authentication solutions for higher education institutions, in the […]

Read More

Okta Charges Up Channel Program Cloud-Based Identity Management Programs

Okta Charges Up Channel Program Cloud-Based Identity Management Programs Businesses migrating to Office 365, Microsoft’s cloud-based productivity suite, are adopting stronger authentication and privilege management measures, according to security vendor Okta, which is adding support and incentives to its channel program to attract systems integrators and other cloud migration specialists. San Francisco-based Okta said it […]

Read More

Factors that Affect Migration for RSA Authentication Manager 7.1 to 8.1

Factors that Affect Migration for RSA Authentication Manager 7.1 to 8.1 When you migrate from RSA Authentication Manager 7.1 to version 8.1 on a new hardware appliance or virtual appliance, keep in mind the following factors that could affect your migration: – Pre-production test environment options – Authentication agents – Authentication downtime – Potential data […]

Read More

Nymi bracelet uses your heartbeat as a password

Forget eyes and fingerprints. The Nymi bracelet wants the future of biometric password protection to be your own unique cardiac rhythm. The Nymi is worn as a bracelet. It monitors your cardiac rhythm, a unique signature for each person. It is constantly authenticating your identity as it wireless interacts with devices. You put it on […]

Read More

Implementing a simple WS-Trust server in WebSphere Message Broker using a database

Small and mid-sized enterprises often don’t have LDAP or IBM Tivoli Federated Identity Manager to manage web services security in their ESB infrastructure. This article shows you how to implement a simple WS-Trust Server using a database to manage authentication. You can easily extend this example to add the authorization part of web services security. […]

Read More

Best Practices for Online Banking Security

Read this ActivIdentity Blog post about the best practices for online banking security. Read more here…

Read More