02.22.2018 - The Fundamentals of Blockchain

Bitcoin is now an ubiquitous term for a leger-based cyber cryptocurrency and is often mentioned in tandem with blockchain. What is blockchain? Are Bitcoin and blockchain the same thing? No, they are not. Bitcoin and blockchain are different in that blockchain is the decentralized ledger that keeps track of all of the Bitcoin transactions. Blockchain technology isn’t confined to just bitcoin though. It’s a digital platform that can be applied to other digital transactions—a smart-grid, of sorts. ...

02.20.2018 - Integrate Your Mobile Applications Into Your Company

When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...

02.14.2018 - Optimal IdM Announces Customer Support for GDPR

Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR). Taking effect in May of 2018, GDPR will require global organizations to control, process and protect the personal data of EU citizens at a much higher level than they do today.  By centralizing all the identities and personal information organizations manage to fewer locations, Optimal IdM provides strengthened data protection through its award-winning solutions. “Optimal IdM only utilizes state-of-the-art data centers, operated by internationally recognized providers that are configured with the highest possible security and are audited annually, keeping us GDPR compliant,” said Ed Gorczyca, Chief Compliance Officer, Optimal IdM. “The amount of encrypted information passed during this authentication exchange is a function of the relying provider request. Optimal IdM does not add any vulnerabilities, or outside processing.” Research indicates that with less than a year before GDPR goes into effect, many organizations are ill-prepared for this new regulation. While GDPR is an EU regulation, the mandate affects any organization that handles the personal information of EU citizens. “The Internet operates without regards to international borders, so an EU citizen’s authentication request may transverse the EU boundary, depending on locations,” added Gorczyca. “Any organization collecting data on European customers may be affected, but our solutions can reduce headaches by acting as a centralized control point for authentication and access to systems throughout your company.” For more information about GDPR and how IAM can help, visit www.optimalidm.com/gdpr. ...

02.6.2018 - Optimal IdM Chief Revenue Officer Mike Brengs to Preside on Panel at the 2018 KNOW Identity Conference

Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced it will preside on a panel at the OWI 2018 KNOW Identity Conference March 26-28 at the Ronald Reagan Building and International Trade Center in Washington, D.C. Mike Brengs, Chief Revenue Officer, Optimal IdM will discuss, “Rethinking Identity Management in the Enterprise” on Tues., March 27 at 1:30 p.m. “Given recent technological advancements and new methods on the horizon, many enterprises are experiencing dramatic shifts in identity management,” said Brengs. “This session will provide practical strategies for transformation and explain how identity holds the key to securing critical data and infrastructure, while delivering the convenient access users demand.” Brengs has over 20 years of experience in the software industry and has been deploying identity management solutions since joining OpenNetwork Technologies in 2000 (acquired by BMC Software), and later with Oblix (acquired by Oracle). Brengs attended the University of South Florida where he earned an undergraduate degree in Management Information Systems and is a Microsoft Certified Professional holding the following certifications: Microsoft Certified Professional 2003, Microsoft Certified Systems Administrator 2003 and Security+. “Pairing a unique and diversified program with the world’s leading identity experts just makes sense,” said Travis Jarae, Co-Founder and CEO of OWI. “In 2017, we had over 120 speakers, including more than 70 C-Level executives. We are proud to have Optimal IdM join our speaker lineup and share their invaluable knowledge, experience and strategies with our attendees.” ...

02.5.2018 - Old Logins are White Hot on the Dark Market: American Security Today

Employers have faith that most of their workers are trustworthy. So when an employee falls for a phishing scam, bosses assume it was an innocent mistake that could happen to anyone. But some of those employees aren’t as innocent as they appear. In a recent study, 27 percent of people employed by large corporations said they would sell their corporate passwords for as little as $150. Read the full article at American Security Today. ...

02.1.2018 - Boost Your Cyber Maturity Level with IAM

What is your company’s cybersecurity maturity level? If you haven’t considered cybersecurity capability maturity-model levels, your company’s identity and access management protocols may not be where they need to be. In general, the stronger your information security maturity model is — meaning the more mature your identity and access management setup is — the greater your defense against outside threats will be. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.