Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Solutions

Centrify warns against ignoring ‘security fatigue’

Post Image

Centrify warns against ignoring ‘security fatigue’ Centrify’s Senior Director APAC Sales Niall King said ‘security fatigue’ was a form of decision fatigue that caused individuals and employees to take greater risks in their security behaviours online. “A recent study from the US National Institute of Standards and Technology found that most interviewees reported that security […]

Post Tagged with ,
Read More

How to Communicate the Value of Identity Management Solutions to Key Stakeholders

Post Image

How to Communicate the Value of Identity Management Solutions to Key Stakeholders Today, companies face a challenging world. Big breaches are constantly in the news, but many executives are underinformed about the realities of cybersecurity. Meanwhile, IT admins are overwhelmed with tasks such as conducting password resets. There are solutions for this situation—identity software among […]

Post Tagged with ,
Read More

Webinar – The Future is Now: What’s New in ForgeRock Access Management

Post Image

Webinar – The Future is Now: What’s New in ForgeRock Access Management January 10, 2017 8:00AM to 9:00AM PST 4:00PM to 5:00PM GMT In this webinar, learn how new capabilities in ForgeRock Access Management: – Enable cloud automation for dynamic architectures – Dramatically improve security – Ensure future-proofing for in-demand technologies such as DevOps and […]

Post Tagged with ,
Read More

Balance Security and Enablement Beyond the Corporate Network

Post Image

Balance Security and Enablement Beyond the Corporate Network Recently General Electric announced that it was piloting an IT initiative that could potentially take the vast majority of its employees off the corporate network when it comes to accessing business applications. According to GE’s CTO, Chris Drumgoole, employees included in the pilot of this new model […]

Post Tagged with ,
Read More

Webinar:Monitoring changes and access events in AD and Azure AD

Post Image

Webinar:Monitoring changes and access events in AD and Azure AD 11/17/2016 11:00:00 AM [(UTC-05:00) Eastern Time (US & Canada)] Knowing what’s happening in Active Directory has always been critical. That was increasingly true as more and more applications inside your network came to rely on AD for identity, authentication and authorization. But now Active Directory […]

Post Tagged with ,
Read More

UnboundID Blog Moves to Ping Blog

Post Image

UnboundID Blog Moves to Ping Blog We often talk about how it’s a dynamic time to be in the identity management industry, and Ping Identity’s recent acquisition of UnboundID underscores just how quickly things are moving. We’re wasting no time as we address the rapidly evolving need for customer identity and access management (CIAM) that […]

Read More

Getting customer IAM right

Post Image

Getting customer IAM right Identity and access management (IAM) has traditionally been associated with solutions designed to manage employee access to on-premises applications and systems, but these days it’s a whole lot more. With the internet now a critical channel for business, creating effective IAM systems for customers has grown in importance. With increasing numbers […]

Post Tagged with ,
Read More

Apache Syncope team is pleased to announce the release of Syncope 2.0.1.

Post Image

Apache Syncope team is pleased to announce the release of Syncope 2.0.1. The Apache Syncope team announced the release of Syncope 2.0.1. Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology . The release will be available within 24h from: http://syncope.apache.org/downloads.html The full change log […]

Post Tagged with ,
Read More

BeyondTrust Announces New Partnerships with KeyData, Novacoast and Sila Solutions Group

Post Image

BeyondTrust Announces New Partnerships with KeyData, Novacoast and Sila Solutions Group BeyondTrust is pleased to announce KeyData, Novacoast and Sila Solutions Group as the newest additions to the BeyondTrust Partner Program. These established identity and access management (IAM) and privileged access management (PAM) service providers are important additions to the BeyondTrust Partner Program, and contribute […]

Post Tagged with ,
Read More