02.13.2017 - Optimal IdM Offers Stand Alone Multi-Factor Authentication-As-A-Service

Tampa, FL, Feb 13, 2017 — Optimal IdM today announced the release of a stand-alone service called OptimalMFA™. OptimalMFA is a multi-factor authentication-as-a-service offering that allows customers to implement a variety of MFA solutions using their existing on-prem or cloud federation solutions. OptimalMFA™ includes Time-based One-Time Password (TOTP), Short Message Service (SMS), Email and Optimal Push Authentication™ (OPA) to be released in Q1 of 2017. Each can be used as a stand-alone option or in conjunction with a complete Identity Access and Management (IAM) program. “Optimal IdM has always been committed to providing scalable and affordable solutions for our customers,” said Mike Brengs, Managing Partner at Optimal IdM. He continued, “So, OptimalMFA has been designed to easily integrate into any Federation solution with a flat, affordable monthly fee.” OptimalMFA is part of the Optimal IdM OptimalCloud™ solution. The OptimalCloud is a complete Identity-as-a-Service (IDaaS) solution with delegated administration and workflow capabilities that can be customized to meet the specific needs of its clients. The OptimalCloud offers a private, secure and dedicated cloud which is essential for meeting corporate security and compliance restrictions. Further to that, The OptimalCloud’s built-in cloud reporting and analytics system provides real time historical audit record of all activity including detailed granular reporting which is stored in a dedicated private database. The OptimalCloud is billed as an affordable, flat monthly fee which fits with budgetary and approval requirements. Visitors to the RSA Conference from February 13-16 will have the opportunity to see a product demonstration of the OptimalMFA as a service at the Optimal IdM booth #N4333. ...


  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest