The Role of Governance in Identity and Access Management
Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity. Over the past decade, there has been Read more...
Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity. Over the past decade, there has been Read more...
Oracle Identity and Access Management 11g Release 2 (11.1.2) includes the following components: • Oracle Identity Manager • Oracle Access Management, which includes the following components: ?Oracle Access Management Access Read more...
Avatier Corp., a leading identity and access risk management solutions provider, today announced it has opened Avatier (Australia) Pty. Ltd., a new office in Sydney, to meet increasing demand for Read more...
IdentityForge is dedicated to providing the most up-to date and feature rich software that is available and proves this by the latest version of their NonStop Tandem Adapter. This Tandem Read more...
Continuing to drive innovation in the identity management market, SailPoint today announced a major release of SailPoint IdentityIQ™. With IdentityIQ 6.0, SailPoint once again raises the bar for the business Read more...
Quest Software, Inc. (QSFT) today announced its new Quest® One Identity Manager Data Governance Edition to help enterprises of all sizes better control and secure their ever-growing volumes of unstructured Read more...
With the rise of the consumerization of IT, enterprises and small businesses alike are finding it more and more difficult to control and secure access to sensitive company information. When Read more...
It is now over a year since the Jericho Forum announced its commandments around identity management and how identity and access management technology should work. The concept was that people Read more...
OAuth is an authorization framework that allows a resource owner to grant permission for access to their resources without the sharing of credentials, and to provide limited access to resources Read more...
In the July 2012 report, “The Forrester Wave: Enterprise Cloud Identity and Access Management (IAM), Q3 2012,” Forrester evaluated six of the top cloud IAM vendors against 15 criteria grouped Read more...