12.31.2008 - Optimal IdM Signs As Sponsor of Directory Experts Conference 2009

Optimal IdM LLC, a leading provider of identity management software and consulting solutions, signed on as a sponsor of The Experts Conference. The conference is being held March 22nd-25th in Las Vegas, NV. Optimal IdM will be showcasing the latest release of its flagship product the Virtual Identity Server, a Micrsoft centric .NET LDAP Virtual Directory. ...

04.29.2008 - Optimal IdM’s VIS™ Provides Multi-Forest Capabilities

The VIS/SharePoint integration provides organizations with an easy way to rapidly deploy SharePoint to users that reside in multiple Active Directory (AD) forests without the need for complicated trust, or complicated configurations. VIS’s powerful coupling with SharePoint is not only rapid and easy but also allows business to maintain full Microsoft Office integration ...

03.3.2008 - Optimal IdM Introduces Virtual Identity Server™

Optimal IdM LLC, a Microsoft Partner and a leading global provider of identity management consulting and software solutions, announced today the formal launch of its Virtual Identity Server (VIS™). VIS is a Microsoft centric virtual directory that is developed entirely in .NET managed code and enhances the functionality of Microsoft’s products such as: Active Directory (AD), Active Directory Application Mode (ADAM) and Identity Lifecycle Manager (ILM). ...

02.22.2008 - Brengs to Speak At the Directory Experts Conference 2008

Optimal IdM LLC, a leading provider of identity management consulting and software solutions, signed on as a sponsor of the Directory Experts Conference. The conference is being held March 3rd-5th in Chicago, IL and is focused on providing Active Directory administrators with advanced technical education. Mr. Brengs’ topic is Synchronization, Federation, Virtualization and Directory Consolidation – Which is the right solution and when? ...


  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest