Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Solutions

Forrester’s Risk-Driven Identity And Access Management Process Framework

Post Image

Forrester’s Risk-Driven Identity And Access Management Process Framework Identity and access management (iAM) processes have always been convoluted. they affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to protect against new or emerging threats, whether from the outside or the inside. Read more at – Forrester’s Risk-Driven […]

Post Tagged with , ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Addressing Security Threat to be Prime Capitalizing Aspect

Post Image

Addressing Security Threat to be Prime Capitalizing Aspect Identity and access management refers to a security discipline and also a particular framework that includes and supports the technology needed for managing electronic identities. It has become imperative for institutions and organizations to have vigilance over their systems and protect user for addressing risks and fortifying […]

Post Tagged with ,
Read More

Centrify warns against ignoring ‘security fatigue’

Post Image

Centrify warns against ignoring ‘security fatigue’ Centrify’s Senior Director APAC Sales Niall King said ‘security fatigue’ was a form of decision fatigue that caused individuals and employees to take greater risks in their security behaviours online. “A recent study from the US National Institute of Standards and Technology found that most interviewees reported that security […]

Post Tagged with ,
Read More

How to Communicate the Value of Identity Management Solutions to Key Stakeholders

Post Image

How to Communicate the Value of Identity Management Solutions to Key Stakeholders Today, companies face a challenging world. Big breaches are constantly in the news, but many executives are underinformed about the realities of cybersecurity. Meanwhile, IT admins are overwhelmed with tasks such as conducting password resets. There are solutions for this situation—identity software among […]

Post Tagged with ,
Read More

Webinar – The Future is Now: What’s New in ForgeRock Access Management

Post Image

Webinar – The Future is Now: What’s New in ForgeRock Access Management January 10, 2017 8:00AM to 9:00AM PST 4:00PM to 5:00PM GMT In this webinar, learn how new capabilities in ForgeRock Access Management: – Enable cloud automation for dynamic architectures – Dramatically improve security – Ensure future-proofing for in-demand technologies such as DevOps and […]

Post Tagged with ,
Read More

Balance Security and Enablement Beyond the Corporate Network

Post Image

Balance Security and Enablement Beyond the Corporate Network Recently General Electric announced that it was piloting an IT initiative that could potentially take the vast majority of its employees off the corporate network when it comes to accessing business applications. According to GE’s CTO, Chris Drumgoole, employees included in the pilot of this new model […]

Post Tagged with ,
Read More

Webinar:Monitoring changes and access events in AD and Azure AD

Post Image

Webinar:Monitoring changes and access events in AD and Azure AD 11/17/2016 11:00:00 AM [(UTC-05:00) Eastern Time (US & Canada)] Knowing what’s happening in Active Directory has always been critical. That was increasingly true as more and more applications inside your network came to rely on AD for identity, authentication and authorization. But now Active Directory […]

Post Tagged with ,
Read More

UnboundID Blog Moves to Ping Blog

Post Image

UnboundID Blog Moves to Ping Blog We often talk about how it’s a dynamic time to be in the identity management industry, and Ping Identity’s recent acquisition of UnboundID underscores just how quickly things are moving. We’re wasting no time as we address the rapidly evolving need for customer identity and access management (CIAM) that […]

Read More

Getting customer IAM right

Post Image

Getting customer IAM right Identity and access management (IAM) has traditionally been associated with solutions designed to manage employee access to on-premises applications and systems, but these days it’s a whole lot more. With the internet now a critical channel for business, creating effective IAM systems for customers has grown in importance. With increasing numbers […]

Post Tagged with ,
Read More