02.14.2018

Leading Identity access management (IAM) solutions provider centralizes
identities and personal information to fewer locations for improved compliance

Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced its commitment to helping customers address requirements for the European Union’s (EU) General Data Protection Regulation (GDPR).

Taking effect in May of 2018, GDPR will require global organizations to control, process and protect the personal data of EU citizens at a much higher level than they do today.  By centralizing all the identities and personal information organizations manage to fewer locations, Optimal IdM provides strengthened data protection through its award-winning solutions.

“Optimal IdM only utilizes state-of-the-art data centers, operated by internationally recognized providers that are configured with the highest possible security and are audited annually, keeping us GDPR compliant,” said Ed Gorczyca, Chief Compliance Officer, Optimal IdM. “The amount of encrypted information passed during this authentication exchange is a function of the relying provider request. Optimal IdM does not add any vulnerabilities, or outside processing.”

Research indicates that with less than a year before GDPR goes into effect, many organizations are ill-prepared for this new regulation. While GDPR is an EU regulation, the mandate affects any organization that handles the personal information of EU citizens.

“The Internet operates without regards to international borders, so an EU citizen’s authentication request may transverse the EU boundary, depending on locations,” added Gorczyca. “Any organization collecting data on European customers may be affected, but our solutions can reduce headaches by acting as a centralized control point for authentication and access to systems throughout your company.”

For more information about GDPR and how IAM can help, visit www.optimalidm.com/gdpr.

About Optimal IdM

Optimal IdM is a global provider of innovative and affordable identity access management solutions. Optimal IdM partners with clients to provide comprehensive, fully customizable enterprise level solutions that meet the specific security and scalability needs of their organizations. Optimal IdM offers its solutions both on premise and in the cloud as a 100% managed service offering. Customers include Fortune 1000 companies, as well as federal, state and local government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception.

Optimal IdM was also recently featured on the Best Identity Management Solutions list of 2018 by PC Magazine, positioned by Gartner, Inc. in the Niche Players quadrant of the Magic Quadrant for Access Management, Worldwide, named a Leader in the KuppingerCole Leadership Compass Identity as a Service: Single Sign-On to the Cloud Report, and awarded Best Multifactor Authentication Solution of 2017 in the Government Security News (GSN) Homeland Security Awards (HSA) Program under the Cyber Security Products and Solutions category. Visit www.optimalidm.com for more information.

# # #

Media Contact:

Dan Chmielewski

Madison Alexander PR

714-832-8716

949-231-2965

dchm@madisonalexanderpr.com

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.