Skip to content

Discovering IAM blogs around world

  • Privacy Policy

Tag: Identity and Access Management

PayPal exec aims to “obliterate passwords from the face of the planet”

PayPal’s top security official is on a quest to kill passwords. “Our intention is to really obliterate, within a certain number of years, both passwords and PINs and see the Read more...

Oracle Access Manager 11gR1 Patchset 2 11.1.1.7 Certified with EBS 12

Oracle Access Manager 11gR1 Patchset 2 (a.k.a. 11.1.1.7) is now certified with E-Business Suite Release 12.0 and 12.1. Applying Oracle Access Manager 11gR1 Patchset 2 will provide you with the Read more...

Palo Alto Networks Selects Ping Identity for Cloud Identity Management

Ping Identity®, The Identity Security Company™, today announced that Palo Alto Networks™, the network security company, has chosen PingFederate® to provide single sign-on (SSO) to its customers accessing support sites Read more...

Hitachi ID Systems Releases Hitachi ID Management Suite Version 8.2

Hitachi ID Systems announced the general availability of the Hitachi ID Management Suite, Version 8.2. The new version updates the Privileged Access Manager (HiPAM), Identity Manager (HiIM) and Password Manager Read more...

Windows Azure Opens Active Directory For General Availability As Identity Battle Heats Up

Microsoft has opened its Active Directory (AD) to general availability on Windows Azure, giving developers access to the single-sign-on service for access to the suite of Microsoft services, third-party apps Read more...

LexisNexis acquires identity authentication technology

LexisNexis Risk Solutions acquired RSA’s dynamic knowledge-based authentication technology in a deal that ends a six-year relationship between the two companies. Atlanta-based LexisNexis said it would integrate the technology into Read more...

Configure OpenAM to use Active Directory for Authentication and DataStore

Check the Forgerock document that shows a step-by-step recipe on how to properly configure OpenAM to use Microsoft Active Directory for both Authentication and (if desired) as a DataStore (sometimes Read more...

“Magical” IAM solutions from Dell Software at RSA 2013

Check the video and discover the identity and access management benefits of the Quest One Identity Solutions from Dell Software, in this “magical” presentation from RSA 2013. Read more...

SailPoint and Edgile Cohost Live Webinar to Address Healthcare IAM Best Practices

The regulatory bar is higher than ever with the HIPAA Omnibus Rule. Faced with this growing compliance challenge, as well as regulatory requirements of HITECH, PCI and others, in the Read more...

Signs Your IT Department Needs an Identity and Access Management System

Identity and access management (IAM) plays an important role within organizations. Consider this real life example. You hire a new employee and issue him a corporate email address and login Read more...

Posts pagination

Previous 1 … 3 4 5 … 15 Next

Recent Posts

  • Sailpoint Blog: Identity security as a business enabler: Protect more, do more, risk less
  • Okta Blog: Risk-based policy-driven security with Device Logout
  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
  • Email security: The current threat landscape, the latest tools/techniques
  • Fall Cyber Solutions Fest 2024: Zero Trust Track
  • Federated Identities: a one-stop hacking shop for all your credentials
  • 3 Ways to Streamline Auth, Access & Security for Oracle EBS
  • Sailpoint: Takeaways from RSA 2023: LLMs, National Defense and identity as the new cybersecurity perimeter
  • Sailpoint – Identity Security Remains Business Essential

Top Posts & Pages

  • Sailpoint Blog: Identity security as a business enabler: Protect more, do more, risk less
  • Okta Blog: Risk-based policy-driven security with Device Logout
  • Securing Machine Identities and Preventing Outages: A Top 2025 Priority for Your Business
  • Conquer Identity Fraud: A Better Model to Safeguard Your Revenue & Reputation
  • Fast Track Your Identity Security: Passkeys & Verified Credentials
- Theme by Grace Themes