09.13.2019 - Using Context-Based Authentication and Authorization to Minimize Risk
07.30.2019 - Authentication 101: Your Basic Guide to Authentication
07.9.2019 - Zero Trust: Organizations can begin to trust users, devices and transactions starting with a high level of IAM services and support.
A Zero Trust model begins with strong identity and access management (IAM) solutions. The challenge is how to balance between absolute assurance (thereby promoting maximum security) and end-user productivity and usability. The user identity can be challenged in many ways – for example, by requiring a hardware token or asking the person to answer a series of security questions – but overtly challenging the user can cause frustration and lead to lost productivity. ...
02.25.2019 - Identity ‘Access’ and ‘Governance’ Tech Converge To Meet Data Protection Challenges: The Last Watchdog
An encouraging consolidation trend is gaining traction among specialized IAM and IGA suppliers. These best-of-breed vendors are joining forces to market and deliver service suites assembled to make a whole that is greater than the sum of its parts. The recently announced Optimal IdM-Omada partnership is a case in point. Read the full article here. By: Byron V. Acohido ...
01.15.2019 - Optimal IdM and Omada Partner to Create New AM and IGA Solution: Solutions Review
Solutions Review reports that the Optimal IdM and Omada partnership is to leverage identity governance data to improve enterprise security risk management and identity federation. Review the full article here. By: Ben Canner ...
03.26.2018 - Privileged Access Management 101
Privileged access management solutions will be beneficial if you use them correctly. This includes: ...
03.12.2018 - RealMe Integration Services from Optimal IdM
02.1.2018 - Boost Your Cyber Maturity Level with IAM
What is your company’s cybersecurity maturity level? If you haven’t considered cybersecurity capability maturity-model levels, your company’s identity and access management protocols may not be where they need to be. In general, the stronger your information security maturity model is — meaning the more mature your identity and access management setup is — the greater your defense against outside threats will be. Click here to calculate where your IAM maturity ranks on our scale! ...
01.23.2018 - GDPR and Governance
In our blogs, “Initiating Steps On The Path To GDPR Compliance” and “GDPR Compliance – Assessing Data Controls and Risk Management”, we discussed data mapping and risk assessments. Today, we are going to discuss governance. ...
12.14.2017 - GDPR Compliance – Assessing Data Controls and Risk Management
After reading our blog “Initiating Steps On The Path To GDPR Compliance” and completing your data mapping exercise, you should now have an understanding of what data your company collects, how it is used, where it is stored, who has access, and when and how it is deleted. What should you do next? For the next step, you need to assess the identified data flows and rate their importance and sensitivity. You may need to have different rating scales to consider, both from the company perspective and an individual’s viewpoint. Proprietary information does not mean much to an individual, just like a social security number does not mean much to the company’s overall survival. So, data’s value is determined by the owner’s perspective. ...