03.31.2018 - Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine

Author: Mark Foust, Director of Worldwide Technical Sales for Optimal IdM Multifactor authentication is the undisputed wave of the future when it comes to identity authentication and access management. But, what does multifactor authentication entail and why use agentless SSO? Here we break down the basics of SSO and various MFA options. Read more >> ...

03.6.2018 - The Barriers to Entry for Blockchain

In part one of our Identity Blockchain blog series, we discussed the fundamentals of blockchain and why establishing trust is a key factor making it work. But beyond the obvious Bitcoin application of the blockchain network, there are a number of blockchain experimental infrastructures already in trial (proof of concepts) by corporations and consortiums. If there’s a ‘market’ for those technologies, they will spin off from central governing bodies and spawn new peers. There are, of course, barriers to widescale blockchain adoption. ...

02.20.2018 - Integrate Your Mobile Applications Into Your Company

When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...

01.12.2018 - IAM Addresses Help Desk Issues

In today’s enterprise, employees need to access many different areas of your computer network, even areas that don’t necessarily fall within their given departments. This creates an access problem, since you don’t want your network left open for anyone to access. Even when companies do take steps to protect their networks, hackers can and will break in, either for the purposes of corporate sabotage or out of a general attempt to do malice. The problem is how to make sure everyone who needs access can get access, while hackers cannot. In the past, companies could give employees a password for their own part of the system, but if any cross-department work was required, they would have to contact the help desk in order to get additional access, slowing down operations and reducing efficiency. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.

Pin It on Pinterest