Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: PAM

Passwords are the keys to the IP kingdom

Passwords are the keys to the IP kingdom According to John Worrall, CMO for CyberArk gaining privilege access is the focus of the attack cycle. “It is all about passwords (keys) and what locks (doors) they open. In the hands of a trusted user passwords are fine – in the hands of a hacker it […]

Read More

CyberArk Webinar: 7 Things to Know About Privileged Account Security

CyberArk Webinar: 7 Things to Know About Privileged Account Security CyberArk is hosting a must-attend webinar for information security professionals on Wednesday, August 12th at 2:00 PM ET. You know that privileged accounts are frequently targeted by advanced attackers, and you know that your organization needs a solution to protect these valuable assets. But how […]

Post Tagged with , ,
Read More

CyberArk Wins Identity and Authentication Management Award at 2015 NetworkWorld Asia Information Management Awards

CyberArk Wins Identity and Authentication Management Award at 2015 NetworkWorld Asia Information Management Awards CyberArk, the company that protects organisations from cyber-attacks that have made their way inside the network perimeter, today announced that it has won the Identity and Authentication Management award at Network World Asia Information Management Awards 2015. The annual awards program […]

Read More

Simeio Solutions Announces Privileged Identity and Cloud Security and Intelligence “as a Service”

Simeio Solutions Announces Privileged Identity and Cloud Security and Intelligence “as a Service” Simeio Solutions today announced two new security-focused Identity and Access Management (IAM) solutions “as-a-Service” at the RSA Conference in San Francisco: – Privileged Identity as a Service – Cloud Security and Intelligence as a Service Simeio Privileged Identity as a Service is […]

Read More

Privileged Password Management Solutions List Updated

Privileged Password Management Solutions List Updated We have updated our Identity Manager Solution list. Take a look and see the different options your company will have to implement privileged password management solutions. These are the vendors we have, if you know other let us know. – Liberman Software – Hitachi ID Systems, Inc. – IBM […]

Read More

2FA in Password Managers: Fair or Faux

2FA in Password Managers: Fair or Faux Password-based Authentication Without the Password? Most good cloud-based password managers require the user to set a Master Password, but do not store this in the users account or in their vault within the cloud service. It is used in the client (usually the browser add-on, or on the […]

Post Tagged with , ,
Read More

ASPG Enables Multi-Factor Authentication for z/OS Security Systems

ASPG Enables Multi-Factor Authentication for z/OS Security Systems Multi-factor authentication, the requirement of users to identify themselves both through something they know (such as a username or email account credentials) and something they have (like a cell phone or key fob), is a security measure which has become increasingly adopted across multiple verticals. Companies varying […]

Read More

Tools4ever is Platinum Sponsor of the 2015 Skyward International Conference (iCon)

Tools4ever is Platinum Sponsor of the 2015 Skyward International Conference (iCon) Tools4ever, the market leader in Identity and Access Management (IdM/IAM) solutions, is pleased to announce its participation as a Platinum Sponsor at the 2015 Skyward International Conference (iCon), in St. Pete Beach, Florida, March 11- 13th, 2015. “This year, the conference will be based […]

Read More

Lieberman Software Announces Interoperability With RSA® Identity Management and Governance Platform

Lieberman Software Announces Interoperability With RSA® Identity Management and Governance Platform to Help Leverage Enterprise Identity Governance for Advanced Cyber Warfare Defense Lieberman Software Corporation today announced an interoperability/go to market partnership with RSA, the Security Division of EMC. The interoperable solution combining Lieberman Software’s Privileged Access Management (PAM) product, Enterprise Random Password Manager™ (ERPM), […]

Read More

Businesses need privileged access security layer, says CyberArk

Businesses need privileged access security layer, says CyberArk “No matter who is conducting the attack, no matter their motive and regardless of where they are coming from, all attackers will seek to gain control of privileged accounts to escalate their privileges and expand their access in the target network,” said Higgins. Improving the security around […]

Read More