Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Solutions

Webinar:Identity Solutions to Support Your Journey to the Cloud

Post Image

Webinar:Identity Solutions to Support Your Journey to the Cloud DATE: 2017-12-28 TIME: 9:00 AM MT Large enterprises have spent decades investing in on-premises infrastructure and software. A comprehensive shift to an all cloud portfolio sounds nice, but for most it’s not feasible. On the journey to the cloud, a variety of complex requirements around hybrid […]

Read More

Identity and access management strategy: Time to modernize?

Post Image

Identity and access management strategy: Time to modernize? IT is constantly evolving, but the speed of change in how organizations of all sizes operate and interact has never been more frenetic. Now is the time to access and modernize your identity and access management strategy. The number of diverse and geographically spread users and devices […]

Post Tagged with ,
Read More

Forrester’s Risk-Driven Identity And Access Management Process Framework

Post Image

Forrester’s Risk-Driven Identity And Access Management Process Framework Identity and access management (iAM) processes have always been convoluted. they affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to protect against new or emerging threats, whether from the outside or the inside. Read more at – Forrester’s Risk-Driven […]

Post Tagged with , ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Addressing Security Threat to be Prime Capitalizing Aspect

Post Image

Addressing Security Threat to be Prime Capitalizing Aspect Identity and access management refers to a security discipline and also a particular framework that includes and supports the technology needed for managing electronic identities. It has become imperative for institutions and organizations to have vigilance over their systems and protect user for addressing risks and fortifying […]

Post Tagged with ,
Read More

Centrify warns against ignoring ‘security fatigue’

Post Image

Centrify warns against ignoring ‘security fatigue’ Centrify’s Senior Director APAC Sales Niall King said ‘security fatigue’ was a form of decision fatigue that caused individuals and employees to take greater risks in their security behaviours online. “A recent study from the US National Institute of Standards and Technology found that most interviewees reported that security […]

Post Tagged with ,
Read More

How to Communicate the Value of Identity Management Solutions to Key Stakeholders

Post Image

How to Communicate the Value of Identity Management Solutions to Key Stakeholders Today, companies face a challenging world. Big breaches are constantly in the news, but many executives are underinformed about the realities of cybersecurity. Meanwhile, IT admins are overwhelmed with tasks such as conducting password resets. There are solutions for this situation—identity software among […]

Post Tagged with ,
Read More

Webinar – The Future is Now: What’s New in ForgeRock Access Management

Post Image

Webinar – The Future is Now: What’s New in ForgeRock Access Management January 10, 2017 8:00AM to 9:00AM PST 4:00PM to 5:00PM GMT In this webinar, learn how new capabilities in ForgeRock Access Management: – Enable cloud automation for dynamic architectures – Dramatically improve security – Ensure future-proofing for in-demand technologies such as DevOps and […]

Post Tagged with ,
Read More

Balance Security and Enablement Beyond the Corporate Network

Post Image

Balance Security and Enablement Beyond the Corporate Network Recently General Electric announced that it was piloting an IT initiative that could potentially take the vast majority of its employees off the corporate network when it comes to accessing business applications. According to GE’s CTO, Chris Drumgoole, employees included in the pilot of this new model […]

Post Tagged with ,
Read More

Webinar:Monitoring changes and access events in AD and Azure AD

Post Image

Webinar:Monitoring changes and access events in AD and Azure AD 11/17/2016 11:00:00 AM [(UTC-05:00) Eastern Time (US & Canada)] Knowing what’s happening in Active Directory has always been critical. That was increasingly true as more and more applications inside your network came to rely on AD for identity, authentication and authorization. But now Active Directory […]

Post Tagged with ,
Read More