02.22.2018 - The Fundamentals of Blockchain
Bitcoin is now an ubiquitous term for a leger-based cyber cryptocurrency and is often mentioned in tandem with blockchain. What is blockchain? Are Bitcoin and blockchain the same thing? No, they are not. Bitcoin and blockchain are different in that blockchain is the decentralized ledger that keeps track of all of the Bitcoin transactions. Blockchain technology isn’t confined to just bitcoin though. It’s a digital platform that can be applied to other digital transactions—a smart-grid, of sorts. ...
02.20.2018 - Integrate Your Mobile Applications Into Your Company
When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...
02.14.2018 - Optimal IdM Announces Customer Support for GDPR
Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR). Taking effect in May of 2018, GDPR will require global organizations to control, process and protect the personal data of EU citizens at a much higher level than they do today. By centralizing all the identities and personal information organizations manage to fewer locations, Optimal IdM provides strengthened data protection through its award-winning solutions. “Optimal IdM only utilizes state-of-the-art data centers, operated by internationally recognized providers that are configured with the highest possible security and are audited annually, keeping us GDPR compliant,” said Ed Gorczyca, Chief Compliance Officer, Optimal IdM. “The amount of encrypted information passed during this authentication exchange is a function of the relying provider request. Optimal IdM does not add any vulnerabilities, or outside processing.” Research indicates that with less than a year before GDPR goes into effect, many organizations are ill-prepared for this new regulation. While GDPR is an EU regulation, the mandate affects any organization that handles the personal information of EU citizens. “The Internet operates without regards to international borders, so an EU citizen’s authentication request may transverse the EU boundary, depending on locations,” added Gorczyca. “Any organization collecting data on European customers may be affected, but our solutions can reduce headaches by acting as a centralized control point for authentication and access to systems throughout your company.” For more information about GDPR and how IAM can help, visit www.optimalidm.com/gdpr. ...
02.8.2018 - SharePoint for Government – Is Seamless AND Secure Authentication Possible?
SharePoint is a Microsoft-based web application platform that businesses use to simplify infrastructure by managing multiple applications data from a single location. This can streamline your processes and improve workflow. How does it work for government agencies, though? ...
02.6.2018 - Optimal IdM Chief Revenue Officer Mike Brengs to Preside on Panel at the 2018 KNOW Identity Conference
Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced it will preside on a panel at the OWI 2018 KNOW Identity Conference March 26-28 at the Ronald Reagan Building and International Trade Center in Washington, D.C. Mike Brengs, Chief Revenue Officer, Optimal IdM will discuss, “Rethinking Identity Management in the Enterprise” on Tues., March 27 at 1:30 p.m. “Given recent technological advancements and new methods on the horizon, many enterprises are experiencing dramatic shifts in identity management,” said Brengs. “This session will provide practical strategies for transformation and explain how identity holds the key to securing critical data and infrastructure, while delivering the convenient access users demand.” Brengs has over 20 years of experience in the software industry and has been deploying identity management solutions since joining OpenNetwork Technologies in 2000 (acquired by BMC Software), and later with Oblix (acquired by Oracle). Brengs attended the University of South Florida where he earned an undergraduate degree in Management Information Systems and is a Microsoft Certified Professional holding the following certifications: Microsoft Certified Professional 2003, Microsoft Certified Systems Administrator 2003 and Security+. “Pairing a unique and diversified program with the world’s leading identity experts just makes sense,” said Travis Jarae, Co-Founder and CEO of OWI. “In 2017, we had over 120 speakers, including more than 70 C-Level executives. We are proud to have Optimal IdM join our speaker lineup and share their invaluable knowledge, experience and strategies with our attendees.” ...
02.5.2018 - Old Logins are White Hot on the Dark Market: American Security Today
Employers have faith that most of their workers are trustworthy. So when an employee falls for a phishing scam, bosses assume it was an innocent mistake that could happen to anyone. But some of those employees aren’t as innocent as they appear. In a recent study, 27 percent of people employed by large corporations said they would sell their corporate passwords for as little as $150. Read the full article at American Security Today. ...
02.5.2018 - Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2018
Optimal IdM is featured on the Best Identity Management Solutions list of 2018 put out by PCMag. Optimal IdM received 4 stars and an editor rating of Excellent. See the complete matrix here. ...
02.1.2018 - Boost Your Cyber Maturity Level with IAM
What is your company’s cybersecurity maturity level? If you haven’t considered cybersecurity capability maturity-model levels, your company’s identity and access management protocols may not be where they need to be. In general, the stronger your information security maturity model is — meaning the more mature your identity and access management setup is — the greater your defense against outside threats will be. Click here to calculate where your IAM maturity ranks on our scale! ...