03.31.2018 - Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine
Author: Mark Foust, Director of Worldwide Technical Sales for Optimal IdM Multifactor authentication is the undisputed wave of the future when it comes to identity authentication and access management. But, what does multifactor authentication entail and why use agentless SSO? Here we break down the basics of SSO and various MFA options. Read more >> ...
03.26.2018 - Privileged Access Management 101
Privileged access management solutions will be beneficial if you use them correctly. This includes: ...
02.20.2018 - Integrate Your Mobile Applications Into Your Company
When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...
02.1.2018 - Boost Your Cyber Maturity Level with IAM
What is your company’s cybersecurity maturity level? If you haven’t considered cybersecurity capability maturity-model levels, your company’s identity and access management protocols may not be where they need to be. In general, the stronger your information security maturity model is — meaning the more mature your identity and access management setup is — the greater your defense against outside threats will be. Click here to calculate where your IAM maturity ranks on our scale! ...
01.23.2018 - GDPR and Governance
In our blogs, “Initiating Steps On The Path To GDPR Compliance” and “GDPR Compliance – Assessing Data Controls and Risk Management”, we discussed data mapping and risk assessments. Today, we are going to discuss governance. ...
01.12.2018 - IAM Addresses Help Desk Issues
In today’s enterprise, employees need to access many different areas of your computer network, even areas that don’t necessarily fall within their given departments. This creates an access problem, since you don’t want your network left open for anyone to access. Even when companies do take steps to protect their networks, hackers can and will break in, either for the purposes of corporate sabotage or out of a general attempt to do malice. The problem is how to make sure everyone who needs access can get access, while hackers cannot. In the past, companies could give employees a password for their own part of the system, but if any cross-department work was required, they would have to contact the help desk in order to get additional access, slowing down operations and reducing efficiency. ...
01.3.2018 - Internal Hiring vs. Hiring a MSSP: Which Is Better?
There’s no question that in today’s day and age, you need a dedicated cybersecurity team to protect your company’s data. The question is, do you dedicate some of your existing IT staff to cybersecurity or do you use a managed security service providers (MSSP) services? Naturally, there are pros and cons to each approach. ...
12.20.2017 - Why Do Data Breaches Happen?
12.14.2017 - GDPR Compliance – Assessing Data Controls and Risk Management
After reading our blog “Initiating Steps On The Path To GDPR Compliance” and completing your data mapping exercise, you should now have an understanding of what data your company collects, how it is used, where it is stored, who has access, and when and how it is deleted. What should you do next? For the next step, you need to assess the identified data flows and rate their importance and sensitivity. You may need to have different rating scales to consider, both from the company perspective and an individual’s viewpoint. Proprietary information does not mean much to an individual, just like a social security number does not mean much to the company’s overall survival. So, data’s value is determined by the owner’s perspective. ...
11.9.2017 - Top 10 Reasons for the Virtual Identity Server (VIS)
LDAP Virtual Directories, such as Optimal IdM’s Virtual Identity Server (VIS), are not a brand new technology. Instead, they have been around for many years. They have quietly solved business issues without much fanfare or publicity. Only recently, has the topic of LDAP Virtual Directories hit the mainstream. In fact, just a few years ago, it was nearly impossible to find Virtual Directory sessions at industry conferences, while this year’s Directory Experts Conference and Digital ID World conference had several sessions on the topic. This is good news for CIO’s, IT managers and companies in general as the benefits and use cases of Virtual Directories become better known. ...