10.18.2012 - Optimal IDM Announces Interoperability with Microsoft Office 365

Optimal IdM, LLC, a Microsoft Gold Certified partner, today announced that its Virtual Identity Server for Office 365™ (VIS for Office 365™) has successfully tested interoperability with Office 365 as part of a structured program for federation. VIS for Office 365 is a product that enables rapid cloud deployment and extends Office 365 by adding additional features and functionality. ...

01.25.2012 - Optimal IDM Signs On As a Gold Sponsor of the Experts Conference

Optimal IdM, LLC, a Microsoft Gold Certified partner, today announced that it will sponsor The Experts Conference (TEC 2012) for the fifth consecutive year Additionally, Optimal IdM will host its first user conference for its technology partners and customers on May 3rd 2012 at the same hotel immediately following TEC. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.