Webinar – Designing an IAM Blueprint and Deploying a Federated Identity...
Webinar – Designing an IAM Blueprint and Deploying a Federated Identity Service Based on Virtualization It’s no secret that Identity & Access Management (IAM) is becoming more complex with time....
View ArticleOkta’s new partner program designed to ease move to cloud
Okta’s new partner program designed to ease move to cloud Okta has unveiled a new partner programme that gives partners the flexibility to decide how they offer their solutions to end users. The...
View ArticleSailpoint – The Power Of Trust In Today’s High-Tech Workforce
In tech, the work is never done. Just when you have launched a great new update to your product or ventured into a new market, you’re already knee-deep in whatever comes next, whether it’s another...
View ArticleDataGrail partners with Okta
US – Privacy management firm, DataGrail, has joined forces with identity and access management company, Okta, to help customers manage privacy laws such as GDPR. This partnership builds upon Okta’s...
View ArticleIdentity Automation Recognized in 2019 Gartner Magic Quadrant for Identity...
Identity Automation, provider of RapidIdentity, the most complete Identity and Access Management (IAM) product on the market, today announced that the company was acknowledged as an Honorable Mention...
View ArticleSailpoint Best Practices for Infusing Identity Governance into your...
I think that we can all agree that it is more important than ever for organizations to empower their users with the right access, when they need it, where they need it, and of course securely. Those...
View ArticleEnterprise-focused Biometric IAM Tablet Features Suprema Fingerprint Scanner
Mexico-based SIASA (or “Sistemas Integrales de Automatización”) has announced a new biometric tablet aimed at the enterprise. Dubbed the BioPad, the tablet is aimed at addressing companies’ identity...
View ArticleSailpoint – Improve Employee Experience and Security through Identity-Centric...
How many times have we heard the old axiom that change is the only constant in life? We certainly know this more than ever before with the displacement of millions of remote users in a matter of...
View ArticleHow to lock down your Microsoft account and keep it safe from outside attackers
What’s your most valuable online account, the one most deserving of protection? If you use a Microsoft account to sign in to a Windows PC, that account and its associated email address should be the...
View ArticleDatawiza Automates Application Integration for Microsoft Azure Active Directory
Datawiza, one of the first companies to offer cloud-delivered Access Management as a Service (AMaaS), today announced Datawiza One-Click for Microsoft Azure Active Directory (Azure AD), enabling IT...
View ArticleThycoticCentrify Releases Enhancements to DevOps Secrets Vault to Harden...
ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today announced enhancements to its...
View ArticleIdentity and Access Management Provider BIO-key Issued U.S. Patent for...
BIO-key International, Inc. (NASDAQ: BKYI), an innovative provider of identity and access management (IAM) solutions powered by biometrics, announced that the company has been issued patent #...
View Article8 top identity and access management tools
The days of perimeter security acting as the core of cybersecurity defenses are long gone. No organization would be caught without firewalls and antivirus scanners to catch low-sophistication attacks,...
View ArticleOkta Completes Acquisition of Auth0
Okta, Inc., the leading independent identity provider, today announced the successful completion of its acquisition of Auth0, a leading identity platform for application teams. Together, Okta and...
View ArticleConnect with SecurID at the Gartner Identity & Access Management Summit
Identity Access & Management (IAM) has never been as important as it is today. Our schools, work, and play all depend on safe and seamless connections to the resources we need to attend class,...
View ArticleAvatier Turns Microsoft Outlook Into Identity Access Management Platform to...
Avatier Corporation, the pioneers of work from anywhere (WFA) Identity Governance & Administration (IGA) cloud service delivered as a container, today announced the release of Avatier for Outlook,...
View ArticleSailPoint Set To Offer a No-Code Way To Automate Security Tasks, Customize...
SailPoint is putting final touches on a no-code way to customize and secure app workflows. The SailPoint Workflows visual SaaS tool aims to empower enterprises to automate security tasks without...
View ArticleLegacy to Modern: Replacing Legacy Identity at PG&E
Pacific Gas and Electric Company (PG&E) is one of the largest combined natural gas and electric energy companies in the United States.?With over 50 thousand employees and contractors operating in...
View ArticleOkta: Build a Secure SPA with React Routing
When building an SPA (single page application) with React, routing is one of the fundamental processes a developer must handle. React routing is the process of building routes, determining the content...
View ArticleIAM vs PAM: What Are the Differences?
Identity and Access Management (IAM) and Privileged Access Management (PAM) are two types of access management systems that are commonly used to manage identity authentication and authorization across...
View Article