Agentless SSO – What’s The Big Deal?
SSO, or single sign-on, as a desired end-state for the user experience as they connect to a diverse set of applications reaps many advantages. There are multiple methods and architectures for achieving SSO, but one that should interest just about every customer is agentless SSO. ...
When to Synchronize, Virtualize and Federate Data in the Enterprise

Privileged Access Management 101
Privileged access management solutions will be beneficial if you use them correctly. This includes: ...
Identity Blockchain: Identity Trust Fabric
RealMe Integration Services from Optimal IdM
The Barriers to Entry for Blockchain
In part one of our Identity Blockchain blog series, we discussed the fundamentals of blockchain and why establishing trust is a key factor making it work. But beyond the obvious Bitcoin application of the blockchain network, there are a number of blockchain experimental infrastructures already in trial (proof of concepts) by corporations and consortiums. If there’s a ‘market’ for those technologies, they will spin off from central governing bodies and spawn new peers. There are, of course, barriers to widescale blockchain adoption. ...
The Fundamentals of Blockchain
Bitcoin is now an ubiquitous term for a leger-based cyber cryptocurrency and is often mentioned in tandem with blockchain. What is blockchain? Are Bitcoin and blockchain the same thing? No, they are not. Bitcoin and blockchain are different in that blockchain is the decentralized ledger that keeps track of all of the Bitcoin transactions. Blockchain technology isn’t confined to just bitcoin though. It’s a digital platform that can be applied to other digital transactions—a smart-grid, of sorts. ...
Integrate Your Mobile Applications Into Your Company
When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...
SharePoint for Government – Is Seamless AND Secure Authentication Possible?
SharePoint is a Microsoft-based web application platform that businesses use to simplify infrastructure by managing multiple applications data from a single location. This can streamline your processes and improve workflow. How does it work for government agencies, though? ...
Boost Your Cyber Maturity Level with IAM
What is your company’s cybersecurity maturity level? If you haven’t considered cybersecurity capability maturity-model levels, your company’s identity and access management protocols may not be where they need to be. In general, the stronger your information security maturity model is — meaning the more mature your identity and access management setup is — the greater your defense against outside threats will be. Click here to calculate where your IAM maturity ranks on our scale! ...

