Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Tag Archives: idm solutions

Tools4ever Creates New Connector between UMRA and Zendesk

Tools4ever, the market leader in identity and access management solutions, announced today that has developed a connector between its solution, User Management Resource Administrator (UMRA), and Zendesk. Zendesk delivers a cloud-based customer service software to thousands of organizations. The new Tools4ever connector allows customers to sync Active Directory users directly with Zendesk through the UMRA, […]

Read More

CyberArk to Address Privilege Connection in Advanced Attacks at HP Protect

CyberArk, the company securing the heart of the enterprise, today announced that CMO John Worrall will host a breakout session focused on privileged-based security breaches during HP Protect in Washington, D.C. September 16-19. In his session, “The Privileged Pathway: Avoid an APT by Locking Down the Road Most Traveled,” Worrall will walk participants through recent […]

Read More

Mirror Mirror: the difference between Identity Management & Access Management

One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) are the same thing. They’re not. And it took a viewing of the famous Star Trek episode called Mirror Mirror for me to best illustrate and articulate the difference between the creation and management of a […]

Read More

Imprivata Introduces New Authentication Devices to Further Simplify Access to Electronic Medical Records and Patient Information

Imprivata®, a leading global provider of healthcare IT security solutions, today introduced a new suite of authentication devices to further simplify access to electronic medical records (EMRs) and patient information. Imprivata’s new line of proximity card and fingerprint readers integrate with Imprivata OneSign® to deliver an end-to-end identity and access management solution that enhances fast, […]

Read More

Rules for Identity and Access Management Success: Access Reviews

Access reviews are the bedrock of a sound Identity and Access Management strategy. What peanut butter is to jelly, and Tom is to Jerry, ensuring user appropriate user access is key to meeting all security and compliance initiatives in the enterprise. When establishing an access certification and review process, enterprises should develop a strategy that: […]

Read More

Configure OpenAM to use Active Directory for Authentication and DataStore

Check the Forgerock document that shows a step-by-step recipe on how to properly configure OpenAM to use Microsoft Active Directory for both Authentication and (if desired) as a DataStore (sometimes referred to as the IDRepo or the User Profile store). Note this procedure is for post installation. Configure OpenAM to use Active Directory for Authentication […]

Read More

Windows Azure with enterprise access management

If you already have Windows Azure Active Directory (AD) tenant or if you are a new customer and create an Azure subscriptions using an Windows Azure AD tenant, you can access the following three new features to more securely and efficiently manage access to Windows Azure. Manage users and their access rights in the Windows […]

Read More

FoxT and CrossIdeas Partnership Enables Seamless Identity Access Governance

Fox Technologies (FoxT) Inc, a leading provider of Access Management and Enforcement software solutions, today announced a partnership with CrossIdeas, an industry leader in Identity Access Governance. FoxT’s Access Management solution suite enables organizations to proactively enforce and audit granular access policies for privileged users accessing servers and end users accessing applications and desktops. These […]

Read More

Approval Process for New User Registration Self-Service in Oracle Identity Manager 11gR2

Identity Management Technical Details

One component for the New User Registration process is the approval, without the approval the account cannot be created on Oracle Identity Manger. The approval for the new user registration works in the next steps: 1. Login into the Oracle Identity Manger 11gR2 Self-Service Console using the Xelsysadm credentials 2. OIM will display the main […]

Read More

Hitachi ID Systems Sponsors 2012 Gartner IAM Summit

Bank of America to discuss Hitachi ID’s Privileged Access Management Solution.Hitachi ID Systems, a world-renowned leader in Identity and Privileged Access Management, is pleased to present the newest version of its advanced identity and access management solutions at this year’s Gartner Identity and Access Management Summit, held December 3-5 in Las Vegas at Caesar’s Palace. […]

Read More