Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Cloud

Managing Macs through a SaaS-Based Platform

Post Image

Managing Macs through a SaaS-Based Platform Smart organizations are leveraging SaaS-based services to manage their Mac desktops and laptops. Whether the organization has AD or LDAP already on-premises or they are leveraging Google Apps, these SaaS-based services managing Mac devices are a simple, cost-effective, and secure way to return control over these devices to IT […]

Post Tagged with , , ,
Read More

Verato Lands $12.5M for Cloud-based Identity Matching Platform

Post Image

Verato Lands $12.5M for Cloud-based Identity Matching Platform Verato, Inc., a leading provider of cloud-based identity matching and Master Patient Index (MPI) solutions has raised $12.5 million in Series B funding led jointly by Bessemer Venture Partners and Columbia Capital. The McLean, VA-based company plans to utilize the funding to to support continued growth and […]

Post Tagged with
Read More

Azure MFA cloud based protection for on-premises VPNs is now in public preview

Post Image

Azure MFA cloud based protection for on-premises VPNs is now in public preview How does the NPS Extension for Azure MFA work? With the NPS Extension for Azure MFA, which is installed as an extension to existing NPS Servers, the authentication flow includes the following components: – User/VPN Client: Initiates the authentication request. – NAS […]

Post Tagged with ,
Read More

Identity Management Software Market – Trends, Growth Propellers, Segmentation And Top Players

Post Image

Identity Management Software Market – Trends, Growth Propellers, Segmentation And Top Players Identity management software enables management of individual’s authentication, principals, authorizations and privileges to access the systems or premises within or across the organization. These software are deployed with an intent of increasing the security while minimizing the downtime, redundancy in tasks and costs. […]

Read More

Webinar: Set Up and Secure a Modern Office in 30 Minutes – without Active Directory

Post Image

Webinar: Set Up and Secure a Modern Office in 30 Minutes – without Active Directory Date: Thursday, January 26th Time: 1:00pm EDT Presented by JumpCloud and Cyberco. The modern office has arrived. WiFi. Virtual machines. Remote management without VPNs. Web apps and infrastructure in the cloud. But how do you take advantage of these IT […]

Post Tagged with , ,
Read More

Apache Directory vs Active Directory

Post Image

Apache Directory vs Active Directory As IT admins evaluate their choice in directory services, they will often consider the open-source solution Apache Directory vs Active Directory. This is an interesting comparison because Apache is built on a foundation of LDAP v3, but it supports Kerberos as well. Active Directory also supports both LDAP and Kerberos. […]

Post Tagged with , , ,
Read More

Bridge Your On-Prem Identity to Cloud Directories With RadiantOne

Post Image

Bridge Your On-Prem Identity to Cloud Directories With RadiantOne The rapid rise of the cloud is driving the new requirement for businesses to host employee, partner, and customer identities in both on-premises enterprise identity stores and cloud environments, such as Azure AD and Amazon Web Services. However, meeting this growing imperative is a real challenge […]

Post Tagged with ,
Read More

Oracle Announcing global availability of Identity Cloud Service!

Post Image

Oracle Announcing global availability of Identity Cloud Service! Oracle announced a few weeks ago about the imminent availability of the Identity Cloud Service (IDCS) – Oracle’s comprehensive Identity and Access Management platform for the cloud. We are pleased to announce today that the service is now GA (Generally Available) and onboarding enterprise customers the world […]

Read More

Securing Privileged Access In IaaS

Post Image

Securing Privileged Access In IaaS In the cloud (public/private) there are a lot of new credential types, authorization models, and proxy scenarios due to the completely new consumption, compute, network perimeters, provisioning and security models. If you look at Infrastructure as a Service (IaaS), privileged access to the infrastructure means PIM must also manage and […]

Post Tagged with ,
Read More

Lieberman Software Securely Manages Credentials and Access to Cloud and On-Premises Resources

Post Image

Lieberman Software Securely Manages Credentials and Access to Cloud and On-Premises Resources Many organizations with on-premises IT environments find that as they move to the cloud, their on-premises management and security solutions stop functioning at the perimeter. At Microsoft Ignite in Atlanta this week, Lieberman Software Corporation will demonstrate how the newest version of its […]

Read More