Optimal IdM Designated as Leader on GigaOm Radar for Multifactor Authentication

New MFA research report highlights user experience and passwordless authentication option from Optimal IdM 

Tampa, FL, September 13, 2022 – Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, is pleased to be named a Leader in the new Radar Report on Multifactor Authentication from GigaOm, an industry leading research and analyst firm.

 

“We are happy to be listed at the top of the class in this latest report on MFA vendors,” said Mike Brengs, Managing Partner and CRO of Optimal IdM. He continued, “Our MFA offering is designed to provide a smooth user experience and the addition of our Optimal Authenticator app does just that. We believe proper security shouldn’t cost extra, so that’s why we include MFA with all of our OptimalCloud offerings.”

 

The OptimalCloud platform, supports multiple authentication methods, including push notifications via the proprietary Optimal Authenticator app, which works for Android, Windows, and iOS. Other authentication methods include FIDO2 devices, RADIUS, OTP and TOTP, SMS, and security questions.

 

A distinguishing feature of the OptimalCloud is the integration with TypingDNA, a solution that analyzes and learns typing pattern behavior. This feature is a key enabler for a smooth user experience and passwordless authentication. After the solution successfully learns a user’s typing pattern, a user can log into an IT resource by typing in only their username or email address.

 

For policy management, the OptimalCloud allows the definition of MFA requirements based on organizational membership or on access to specific applications. Administrators can also implement adaptive MFA by combining dynamic and static policies such as user behavior, device, and location.

 

More information about the OptimalCloud and the MFA offering can be found at www.TheOptimalCloud.com

 

About The OptimalCloud

The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. The OptimalCloud is currently integrated with more than 11,000 applications.

 

About Optimal IdM

Optimal IdM is a global provider of innovative and affordable identity access management solutions. Optimal IdM partners with enterprise and small to mid-sized businesses to provide comprehensive and affordable IAM solutions that meet their specific security, usability, and scalability needs. Optimal IdM also offers its solutions as a managed service offering. Customers include Fortune 1000 companies from every industry as well as federal, state and local government agencies. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception.

 

Visit www.optimalidm.com for more information.

 

# # #

Optimal IdM Contact: 

Matt Pitchford

Director of Marketing

 

matt.pitchford@optimalidm.com

 

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest