03.31.2018 - Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine
Author: Mark Foust, Director of Worldwide Technical Sales for Optimal IdM Multifactor authentication is the undisputed wave of the future when it comes to identity authentication and access management. But, what does multifactor authentication entail and why use agentless SSO? Here we break down the basics of SSO and various MFA options. Read more >> ...
03.26.2018 - Privileged Access Management 101
Privileged access management solutions will be beneficial if you use them correctly. This includes: ...
03.22.2018 - Identity Blockchain: Identity Trust Fabric
03.12.2018 - RealMe Integration Services from Optimal IdM
03.6.2018 - The Barriers to Entry for Blockchain
In part one of our Identity Blockchain blog series, we discussed the fundamentals of blockchain and why establishing trust is a key factor making it work. But beyond the obvious Bitcoin application of the blockchain network, there are a number of blockchain experimental infrastructures already in trial (proof of concepts) by corporations and consortiums. If there’s a ‘market’ for those technologies, they will spin off from central governing bodies and spawn new peers. There are, of course, barriers to widescale blockchain adoption. ...
02.20.2018 - Integrate Your Mobile Applications Into Your Company
When it comes to integrating your mobile applications into your company’s backend, you need a secure authentication and authorization process that’s not only efficient, but also reliable, easy-to-use and supportive of cloud-based access. Learn more about implementing a safe integration of your mobile applications below. ...
02.8.2018 - SharePoint for Government – Is Seamless AND Secure Authentication Possible?
SharePoint is a Microsoft-based web application platform that businesses use to simplify infrastructure by managing multiple applications data from a single location. This can streamline your processes and improve workflow. How does it work for government agencies, though? ...
01.12.2018 - IAM Addresses Help Desk Issues
In today’s enterprise, employees need to access many different areas of your computer network, even areas that don’t necessarily fall within their given departments. This creates an access problem, since you don’t want your network left open for anyone to access. Even when companies do take steps to protect their networks, hackers can and will break in, either for the purposes of corporate sabotage or out of a general attempt to do malice. The problem is how to make sure everyone who needs access can get access, while hackers cannot. In the past, companies could give employees a password for their own part of the system, but if any cross-department work was required, they would have to contact the help desk in order to get additional access, slowing down operations and reducing efficiency. ...