02.4.2016 - Optimal IdM’s Mike Brengs featured on ISACA

Michael Brengs, Managing Partner, Optimal IdM According to research by the Ponemon Institute, the average cost of a data breach in 2015 reached more than $3.8 million, or between $145 and $154 per record compromised. That is a 23 percent increase over 2013. This upward trend reflects a clear need for more effective security controls, both in terms of information storage and at the level of an organization’s policies and procedures. While every business faces different threats, there are several steps every entity can take to be more secure. Click Here to Read the Full Blog Post   ...

10.8.2015 - Webinar: What’s New, What’s Next at Optimal IdM

What's New, What's Next A lot of exciting things have been going on at Optimal IdM over the past year including new products, new product features, a new website and more! On Thursday, October 22 from 1:00 pm – 1:45 pm EDT we presented a live webinar titled What’s New, What’s Next at Optimal IdM” . The webinar covered: ...

09.23.2015 - Optimal IdM to Release TOTP in The OptimalCloud

TAMPA, Fla., Sept. 23, 2015 — Optimal IdM will be showcasing their cloud federation and single sign-on solution, The OptimalCloud and talking about their upcoming release of Time-based One-time Password (TOTP) support in front of more than a thousand identity management representatives as a sponsor at the Global Identity Summit this week in Tampa, Florida.  In addition to its cloud Identity as a Service (IDaaS) solution, Optimal IdM representatives will be highlighting the use cases for its on premise solutions such as its flagship product the Virtual Identity Server which is an LDAP Virtual Directory. TOTP is an algorithm that generates a one-time password based on a shared secret key and current time stamp that is the foundation of OATH and commonly used for two-factor authentication systems and cloud applications. Time-based one-time passwords are appealing because they provide a higher level of security, requiring a traditional static password and a TOTP which changes every 30 to 60 seconds, making it extremely resistant to attacks and security breaches. Optimal IdM, is currently in the process of building support for TOTP into its cloud federation and single sign-on solution, The OptimalCloud which has recently won several large contracts over competitors such as Okta, Ping and OneLogin. There are several key factors that consistently keep The OptimalCloud ahead of the competition. First, whereas most of the competition offers little beyond single sign-on, The OptimalCloud is a complete identity management solution with delegated administration and workflow capabilities that can be customized to meet the specific needs of its clients via Optimal IdM’s concierge, “zero-config” service. Secondly, The OptimalCloud offers a private, secure and dedicated cloud which is essential for meeting government and corporate security and compliance restrictions. Further to that, The OptimalCloud’s built-in cloud reporting system provides real time historical audit record of all activity including detailed granular reporting which is stored in a dedicated private database. Lastly, The OptimalCloud is billed as an affordable, flat monthly fee which is a perfect fit with government budgetary and approval requirements. About Optimal IdM Optimal IdM, LLC. is a leading global provider of innovative and affordable identity management software. Headquartered in the Tampa Bay area of Florida, Optimal IdM provides sales and services through regional offices across the United States and a growing network of resellers and distributors. Optimal IdM’s customers include Fortune 1000 companies, as well as Federal, State and Local Government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception. Media Contact: Mike Brengs, Optimal IdM, (813) 425-6351, sales@optimalidm.com ...

10.18.2012 - Optimal IDM Announces Interoperability with Microsoft Office 365

Optimal IdM, LLC, a Microsoft Gold Certified partner, today announced that its Virtual Identity Server for Office 365™ (VIS for Office 365™) has successfully tested interoperability with Office 365 as part of a structured program for federation. VIS for Office 365 is a product that enables rapid cloud deployment and extends Office 365 by adding additional features and functionality. Michael Brengs, Director of Sales for Optimal IdM, states, “We are excited our software has been tested by Microsoft in their labs as a part of a structured program which only reinforces the quality product that we are selling. Additionally, our customers now know that Microsoft supports their use of our software for their Office 365 implementation.” ...

04.30.2012 - Optimal IDM Announces Virtual Identity Server for Office 365

Optimal IdM, LLC, a Microsoft Gold Certified partner, today announced the Virtual Identity Server for Office 365™ (VIS for Office 365™), a product that enables rapid cloud deployment and extends Office 365 by adding additional features and functionality. VIS for Office 365 is a complete end-to-end solution including: synching users and groups, providing a cloud firewall that can filter or translate data as it is synched (or during authentication), as well as, providing complete audit logging, two-factor authentication and denial of service (DoS) capabilities. ...

02.14.2012 - Optimal IDM Announces Doubling Software Sales Revenue

Optimal IdM, LLC, a Microsoft Gold Certified partner, today announced that its software sales have doubled for the fifth consecutive year. Optimal IdM’s growth can be directly attributed to its continued innovative technological development and growth in new market sectors in both domestic and international regions. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.