Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Tag Archives: iam

Microsoft, the ID2020 Alliance, universal digital identification and you

Post Image

Microsoft, the ID2020 Alliance, universal digital identification and you Last year Microsoft joined ID2020, a global Alliance whose goal is to create universal digital identities for everyone. What are the social, economic and ethical implications of such an initiative? Our digital activity increasingly parallels our real-world activity. Participation in the modern economy, the ability to […]

Read More

How to configure and use Amazon’s free IAM service

Post Image

How to configure and use Amazon’s free IAM service Amazon Web Services has a built-in service that controls access to AWS resources. This service, called IAM (Identity and Access Management), allows administrators to control who, what, and where any given user can perform an action in a resource. The following list contains all the key […]

Post Tagged with , ,
Read More

Aurionpro concludes sale of IAM business to KPMG

Post Image

Aurionpro concludes sale of IAM business to KPMG Aurionpro Solutions today said it has concluded sale of its identity and access management (IAM) business to KPMG LLP, USA for about Rs 217 crore. On January 3, Cyberinc, an Aurionpro subsidiary, entered into a definitive agreement with KPMG LLP, USA for sale of its identity and […]

Post Tagged with , ,
Read More

Managed Identity and Access Management (IAM)

Post Image

Managed Identity and Access Management (IAM) Managed identity and access management solutions are making a major impact for IT organizations. Identity management is a major part of any IT organizations management tool infrastructure, and a new generation of tools is making it easier than ever for organizations to securely and efficiently run their operations. Let’s […]

Post Tagged with ,
Read More

Download Designing your Hybrid Cloud Strategy: Identity and Access Management

Post Image

Download Designing your Hybrid Cloud Strategy: Identity and Access Management In this e-book, you’ll explore Azure solutions that help solve the following common hybrid cloud identity and access challenges: -Bringing user identities together. -Implementing a single identity for better manageability and lower cost. -Improving security with easily managed identities. -Integrating new apps into your system. […]

Read More

The Difference Between IAM’s User Provisioning and Data Access Management

Post Image

The Difference Between IAM’s User Provisioning and Data Access Management Identity and access management (IAM)’s user provisioning and data security’s data access management both manage access. But provisioning is not a substitute, nor is it a replacement for data access management. The nuances between the two are enough to put the two in distinct categories. […]

Post Tagged with , ,
Read More

SSO isn’t Identity Management

Post Image

SSO isn’t Identity Management In the identity management world, there’s no doubt that web application SSO (single sign-on) has been one of the hottest sectors. In fact, AngelList identifies 16,600+ startups in the SaaS market, so it’s safe to say there are more web-based applications available than IT admins and users know what to do […]

Post Tagged with , ,
Read More

Let Silent Security Drive Your Identity and Access Management

Post Image

Let Silent Security Drive Your Identity and Access Management As employees and consumers, we’ve all faced similar access frustrations, from being pestered with prompts for passwords we couldn’t remember to responding to authentication requests sent to devices that we didn’t happen to have in hand. While strong authentication is great for security, it leaves a […]

Post Tagged with ,
Read More

Edgile Speaks About the New Age of IAM at the Gartner Identity & Access Management Summit

Post Image

Edgile Speaks About the New Age of IAM at the Gartner Identity & Access Management Summit Edgile, the leading cyber risk and regulatory compliance partner to the Fortune 500, will present a case study on IAM best practices at the Gartner Identity & Access Management Summit in Las Vegas, Nevada, November 28-30, 2017. In a […]

Post Tagged with , ,
Read More

How the future will blur the lines of authentication & identity management

Post Image

How the future will blur the lines of authentication & identity management Identity theft is now the number one attack vector – and the truth is, attackers love weak passwords. According to Verizon’s 2017 Data Breach Investigation Report, 81% of hacking-related breaches leveraged stolen or weak passwords. This puts the most common authentication techniques under […]

Post Tagged with ,
Read More