12.27.2019 - Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2020
Optimal IdM is featured on the 2020 Best Identity Management Solutions list published by PCMag. Optimal IdM received 4 stars and an editor rating of Excellent. See the complete matrix here. ...
12.18.2019 - Optimal IdM Named An APAC Top 10 Identity & Access Management Company
Enterprise Security lists Optimal IdM as one of the top APAC Identity and Access Management Companies for 2019. View the top 10 list here: ...
12.18.2019 - Solutions Review Names Optimal IdM an Identity Management Vendor to Watch in 2020
Solutions Review Names 10 Identity Management Vendors to Watch, 2020 ...
12.9.2019 - New Partner Platform From Optimal IdM Includes Multi-Tenant Support
Optimal IdM, a leading provider of SaaS-delivered Identity and Access Management (IAM) solutions, has announced the release of The OptimalCloud™ Partner Platform. ...
11.27.2019 - 5 Ways to Create a Better Customer Experience and Increase Sales
Using social sign-ons and creating a better user experience starts at your company’s registration page. ...
11.18.2019 - 6 Ways Blockchain Is Impacting Marketing – and How to Take Advantage of It
Optimal IdM provides input on how blockchain technology fosters trust in an identity framework. ...
11.18.2019 - Snyk Releases a Kubernetes-focused Container Security Platform
Optimal discusses why containers can streamline IT work using it’s Virtual Identity Server as an LDAP Proxy Server. ...
10.23.2019 - Authentication, Authorization, and API Enablement
10.16.2019 - KuppingerCole Analyst Executive View: Optimal IdM and The OptimalCloud™
The IDaaS market has evolved over the past few years and is still growing, both in size and in the number of vendors. However, under the umbrella term of IDaaS, we find a variety of offerings. IDaaS, in general, provides Identity & Access Management capabilities as a service, ranging from Single Sign-On to full Identity Provisioning for both on-premise and cloud solutions. These solutions also vary in their support for different groups of users – such as employees, business partners, and customers – their support for mobile users, and their integration capabilities back to on-premise environments. ...
10.15.2019 - Customer Experience Starts at Your Registration Screen
Social sign-ons are not meant to and should not be used to protect sensitive assets. Of greater concern is that data sharing is a two-way street. When a company uses single sign-on, it gets information such as email addresses and geographical locations from the social network; however, it also may be giving information about its users’ behaviors back to the social network. Businesses should understand which user information they are sharing when they agree to the terms of the social network.