08.1.2018

Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced it has achieved ISO/IEC 27001:2013 certification, the international standard outlining best practices for information security management systems. “These certifications validate our commitment to transparency and providing the highest standards of security to our customers,” said Ed Gorczyca, Chief Compliance Officer at Optimal IdM.

About ISO/IEC 27001:2013 Certification

The ISO (International Organization for Standardization) and the IEC (International Electrotechnical Commission) form the specialized system for worldwide standardization. The ISO/IEC 27001:2013 certification provides requirements for establishing, implementing, maintaining and continually improving an information security management system. It preserves the confidentiality, integrity and availability of information by applying a risk management process and gives confidence to interested parties that risks are adequately managed.

“We strive to have a consistent and repeatable risk-based security program, something our SOC 2 and ISO/IEC 27001:2013 certifications demonstrate,” said Ed Gorczyca, Chief Compliance Officer at Optimal IdM.

The ISO/IEC 27001:2013 certification confirms a management and security program is in place to address the risks associated with a cloud-based deployment.  This provides another independent assurance to our customers that our operational approach and methods for The OptimalCloud™ provide a safe, secured, and controlled environment with routine monitoring and oversight.  The result is a robust system that enhances our cloud product offerings.

Identity Access Management in the Cloud and On-Premise

The Optimal IdM product and service portfolio includes a full-featured cloud Identity as a Service (IDaaS) platform named The OptimalCloud. The OptimalCloud provides universal single-sign-on (SSO), Federation Brokering, MFA Services, authorization enforcement, audit and reporting services. It can be combined with the exclusive power of Optimal’s Virtual Directory to solve today’s unique identity, cybersecurity, regulatory and compliancy issues.

Optimal IdM’s on-premise offerings include the award winning Virtual Identity Server (VIS), which provides a secure, policy driven SSO solution incorporating Federation Services, and a single manageable console for initial authentication security policies. It provides a single view of hundreds of Active Directory forests, LDAP directories as well as other data repositories like SQL, Oracle and many others. VIS seamlessly integrates with Microsoft applications including SharePoint, Office 365 as well as on-premise legacy applications. VIS is currently integrated with more than 5,000 applications and more are added every day.

About Optimal IdM

Optimal IdM is a global provider of innovative and affordable identity access management solutions. Optimal IdM partners with clients to provide comprehensive, fully customizable enterprise level solutions that meet the specific security and scalability needs of their organizations. Optimal IdM offers its solutions both on premise and in the cloud as a 100% managed service offering. Customers include Fortune 1000 companies, as well as federal, state and local government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception. Visit Optimal IdM for more information.

# # #

Media Contacts:

Matt Pitchford

Optimal IdM

matt.pitchford@optimalidm.com

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.