Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: Cloud Identity Management

Dell boosts security, access capabilities

Dell boosts security, access capabilities Dell has released Dell One Identity Cloud Access Manager 8.0, which leverages Dell’s new Security Analytics Engine to give organizations control of web-based applications and OpenID Connect-compliant mobile application access activities within the organization. This control improves security and enables easier, appropriate access across a wide range of application types […]

Read More

Centrify Wants To Bring Identity Management To Hadoop

Centrify Wants To Bring Identity Management To Hadoop Big data is an attention-grabbing term in the technology space. So if you’re a vendor looking to gain some attention, usurping the term “big data” for your own solution is a no-brainer, regardless of whether the term is appropriate or not. Which brings us to an announcement […]

Read More

SnapLogic Integrates With the Okta Application Network to Boost Cloud Security

SnapLogic Integrates With the Okta Application Network to Boost Cloud Security SnapLogic, the Elastic Integration company, today announced it has integrated with Okta, the leader in cloud-based identity and mobility management, to enable seamless, secure access to the SnapLogic platform and a single point of control for user authentication and authorization through the Okta Application […]

Read More

OneLogin Achieves Another Compliance Milestone With ISO 27001 Certification

OneLogin, the innovator in identity management, today announced it has achieved ISO 27001 certification, providing independent verification that OneLogin has implemented the latest and most rigorous information security management processes to protect its systems and customers. OneLogin is the first cloud-based identity management provider to obtain this certification of operational excellence, which is especially important […]

Read More

Ping Identity Named Leader in Identity Access Management

Ping Identity Named Leader in KuppingerCole Leadership Compass for Cloud User and Identity Access Management. The Identity Security Company Recognized for Product, Innovation and Market Leadership. Ping Identity, The Identity Security Company, has been positioned as a three-time leader in the KuppingerCole Leadership Compass on Cloud User and Access Management. Ping Identity has also been […]

Read More

ImageWare Signs Three-Year Agreement With Major International Retailer to Provide Multi-Modal Biometric Identity Management on the Fujitsu Cloud

ImageWare Systems, Inc., a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has signed a three-year agreement with a major international retailer to provide its cloud-based, multi-modal biometric identity management product suite running on the Fujitsu Trusted S5 Cloud platform. Under the agreement, ImageWare’s IWS CloudID® product suite will use face, finger, iris […]

Read More

Synacor Providing TELUS With Cloud ID Authentication Technology

Synacor Providing TELUS With Cloud ID Authentication Technology Synacor Inc., the leading provider of next-gen award-winning TV Everywhere solutions and cloud-based Identity Management (IDM) services, across multiple devices for telecom and consumer electronics companies in the U.S. and abroad, today announced it has reached an agreement with TELUS —Canada’s fastest-growing national telecommunications company—to provide Cloud […]

Read More

Okta Delivers New Identity Offerings to Power Cloud-Based Services

Today, Okta announced enhanced functionality that enables software providers to address identity management challenges associated with the delivery of their own cloud-based services. Advent Software (NASDAQ: ADVS) and Jive Software (NASDAQ: JIVE) are among leading companies leveraging Okta as an embedded component to accelerate customer adoption, increase security, and reduce time to market. By using […]

Read More

The Problem With Two-Factor Authentication

The failure of corporate security strategies to protect personal identity information from hackers resides more with system architecture than with authentication technology. Here’s why. For too long, enterprises have been looking for the perfect two-factor authentication. First, it was X.509, then hard tokens, then SMS, and now Push and biometrics. And still, hackers keep winning. […]

Read More

Identity Management In The Cloud

As companies add more cloud services to their IT environments, the process of managing identities is getting more complex. When companies use cloud services — services they don’t control themselves — they still must develop sound policies around role-based access. They still must grant rights to users who need information to get work done. And […]

Read More