09.17.2019 - Behavioral Biometrics Explained
A useful and growing field in the area of identity authentication is biometrics. The three major accepted factors for identification are knowing something, having something and being something. A person can identify themselves through demonstrating a secret piece of knowledge such as a password or PIN, producing an access card, fob or key or presenting something that is a part of them, like their fingerprint. The last category is what we mean when we talk about biometrics. ...
09.13.2019 - Using Context-Based Authentication and Authorization to Minimize Risk
09.4.2019 - What is a Virtual Directory Server?
Essentially, a virtual directory server is a way to visualize the data between applications that are fundamentally incompatible, as well as directory servers and data stores that are incompatible. A virtual directory server is a type of software application known as a middleware application, and it abstracts back-end data from client software applications, which makes it possible to change the presentation of the data dynamically. You can simply integrate new applications into your current identity infrastructure without needing to alter directory data – your data stays in its original format and place. ...
08.29.2019 - Optimal IdM Named a Niche Player in the 2019 Gartner Magic Quadrant for Access Management
Tampa, FL, August 29, 2019 – Optimal IdM, a leading provider of SaaS-delivered Identity and Access Management (IAM) solutions, has announced it has been positioned in the Niche Players quadrant of the “2019 Magic Quadrant for Access Management.” Gartner defines the Access Management market as “vendors providing solutions that use access control engines to provide centralized authentication, SSO, session management and authorization enforcement for target applications in multiple use cases (B2E, B2B and B2C). Adaptive and contextual authentication are core elements, as is support for modern identity protocols such as SAML, OAuth2 and OIDC.” ...
08.21.2019 - 7 Steps to Attain a Zero Trust Security Posture
08.8.2019 - The State of The Ransomware Problem
07.30.2019 - Authentication 101: Your Basic Guide to Authentication
07.16.2019 - Optimal IdM and Precise Technologies Partner To Address IAM Market In Middle East, Turkey and Africa
07.12.2019 - 5 Big Data Vulnerabilities You Could Be Overlooking
Optimal discusses the importance of IAM and how only the right people should have access to data, and there must be controls in place to both prevent and allow access when necessary. ...
07.9.2019 - Zero Trust: Organizations can begin to trust users, devices and transactions starting with a high level of IAM services and support.
A Zero Trust model begins with strong identity and access management (IAM) solutions. The challenge is how to balance between absolute assurance (thereby promoting maximum security) and end-user productivity and usability. The user identity can be challenged in many ways – for example, by requiring a hardware token or asking the person to answer a series of security questions – but overtly challenging the user can cause frustration and lead to lost productivity. ...