Sept 2022 Newsletter In this issue: Optimal named MFA Leader; Best Practices in Cyber; VIS
Optimal named MFA Leader; Best Practices in Cyber; VIS
Optimal IdM is pleased to be named a Leader in the new Radar Report on Multifactor Authentication from GigaOm.
Aug 2022 Newsletter In this issue: IAM planning; IDaaS Pros and Cons; IAM Maturity
IAM planning; IDaaS Pros and Cons; IAM Maturity
Identity and Access Management (IAM) is one of the most important aspects of a cybersecurity plan. How can IAM help you?
July 2022 Newsletter In this issue: How To Unite ADs; SSO; Okta Breach Dissected
How To Unite ADs; SSO; Okta Breach Dissected
Virtual Identity Servers (VIS) make merging directories seamless and inexpensive. Learn more today.
June 2022 Newsletter In this issue: Customer IAM; VDS and OptimalCloud Win at RSA
Customer IAM; VDS and OptimalCloud Win at RSA
Unlike IAM, which is internally focused, CIAM is designed from the ground up to please customers and control access in a way that is transparent, customizable, and secure. Learn more!
May 2022 Newsletter In this issue: Preventing Hacks – Okta Hack; Remote Training Best Practices
Preventing Hacks – Okta Hack; Remote Training Best Practices
Even security giants such as Okta are vulnerable to hacks. Why does this happen and how can you prevent it?
April 2022 Newsletter In this issue: Ransomware; Password Problems; Identity Fabrics & MFA; World Password Day
Ransomware; Password Problems; Identity Fabrics & MFA; World Password Day
Ransomware is one of the more prevalent threats to organizations of any size. Are you protected?
March 2022 Newsletter In this issue: New Agentless B2B Desktop SSO Solution; 2022 Cyber Stats; ID Fabrics
New Agentless B2B Desktop SSO Solution; 2022 Cyber Stats; ID Fabrics
Let’s look at what we discovered in the last year with some cybersecurity statistics for 2022.
Feb 2022 Newsletter In this issue: Identity Fabrics; Cyber checklist; RBA
Identity Fabrics; Cyber checklist; RBA
No-code solutions for authentication and access are the future for organizations. Learn more about identity architecture now.
Jan 2022 Newsletter In this issue: Best ways to create a “zero-trust” environment using MFA, SSO and more
Best ways to create a “zero-trust” environment using MFA, SSO and more
The steps outlined in this whitepaper define how a Zero-Trust model is built on strong identity and access management solutions. Learn more.
Dec 2021 Newsletter In this issue: Why you need IAM and Biometrics for Authentication
Why you need IAM and Biometrics for Authentication
Is your team up-to-date regarding the latest forms of authentication? Read more today.
Nov 2021 Newsletter In this issue: How Data Breaches Happen; Share Your Insight
How to Better Secure User Authentication Protocols; IAM For Businesses
Is your organization safe from scams such as ProxyTokens? Learn how you can stay protected.
Oct 2021 Newsletter In this issue: How Data Breaches Happen; Share Your Insight
Cyber Awareness Month; What is SCIM and IAM in FinTech
Having a comprehensive IAM plan is crucial for businesses of any shape and size. Learn more about how your can protect your organization.
Sept 2021 Newsletter In this issue: $50 for your opinion; Authentication vs. Authorization; Securing the Cloud With Biometric Data
$50 for your opinion; Authentication vs. Authorization; Securing the Cloud With Biometric Data
We often hear about authentication and authorization, but do we truly know what the main differences are?
Aug 2021 Newsletter In this issue: How Data Breaches Happen; Share Your Insight
How Data Breaches Happen
A data breach can be detrimental for companies of shape and size. What can your organization do to prevent that?
July 2021 Newsletter In this issue: Why Is IAM So Important?
Why Identity Access Management Is So Important for Data Security
IAM systems reduce risk of sudden changes in the workplace and sets you up for success in the following areas:
- Stopping the spread of malware
- Opening the company portal to potential clients
- Monitoring employee productivity
- Improving the overall user experience (single sign-on or multi-factor credentials)
June 2021 Newsletter In this issue: Could MFA have prevented the Colonial hack?
The Breach That Didn’t Have to Happen
The the word “colonial” is going to resonate for a long time with East Coasters, especially the ones who couldn’t get gas to get to work or pick up their kids. It will be years until Colonial Pipeline’s name is no longer synonymous in the public’s mind with gas lines and ransomware.
May 2021 Newsletter In this issue: Event – Enabling the Future of Identity and Access Management
KuppingerCole Live Event, Sponsored by Optimal IdM – Enabling the Future of Identity and Access Management
Please join us for this free IAM virtual event from KuppingerCole Analysts, Enabling the Future of Identity and Access Management on Thursday, May 27 2021.
April 2021 Newsletter In this issue: OptimalCloud for SMBs
OptimalCloud for SMBs
Leaders at small and mid-sized businesses (SMBs) are innovators. Unhindered by legacy technology or long approval chains, they relentlessly pursue every chance to improve efficiency and reduce costs. While SMBs have the will to try new technologies, they don’t always have the means. Smaller budgets and busier staffs are obvious roadblocks, but SMBs have also been hampered by a lack of access to security solutions that make sense for businesses of their size.
March 2021 Newsletter In this issue: Big Announcement with OptimalCloud!
Small and Mid-Sized Businesses Have New Alternative For Identity Access Management
Optimal IdM has announced new tiered offerings of the award winning OptimalCloud™ platform. This new offering challenges other multi-tenant IAM solutions who target small and mid-sized businesses, however, unlike these competitors, our base price of $2/per user includes a more robust feature set that includes SSO, MFA, Universal Directory, Lifecycle Management, Delegated Administration and Adaptive Authentication/Authorization, just to name a few.
February 2021 Newsletter In this issue: WFH, Perimeter of Security, AM Leader’s Guide
Identity as the New Perimeter of Security
There was a time when all of a company’s data was completely on the premises. Even an employee who needed to work remotely would use a VPN to get into the company’s on-premise physical network. This was an environment with many fewer challenges to authentication security. Everyone who was in a position to access a company’s data was someone who was supposed to be there, so as long as the building’s physical security was strong, cybersecurity would be strong as well.
January 2021 Newsletter In this issue: IAM Capabilities, Data Care and Managed Services
IAM Capabilities, Data Care and Managed Services
When it comes to caring for your data, even a small, brief data breach can be catastrophic for your bottom line and your reputation. So what types of data breaches should you be on the lookout for?
December 2020 Newsletter In this issue: Is IAM a Human Problem?; Tech Services Survey
IAM Managed Services Address a Human Problem
Optimal IdM discusses multifactor authentication uses to secure remote employees with Cybersecurity Insiders.
November 2020 Newsletter In this issue: Cyber Awareness; Insight Jam; IAM Maturity; Tech Services Survey
Best Practices for Improving Employee Cyber Awareness
Optimal IdM discusses multifactor authentication uses to secure remote employees with Cybersecurity Insiders.
October 2020 Newsletter In this issue: Secure Your Devices; CIAM Webinar; Forrester Wave
Optimal IdM Named a Contender in Forrester’s 2020 CIAM Report
Optimal IdM has been positioned as a contender in The Forrester Wave™: Customer Identity And Access Management, Q4 2020.
Mike Brengs, Managing Partner and CRO with Optimal IdM, said, “We are excited to be named as a contender in the CIAM space by Forrester.” He continued, “We plan to continue innovation in this area including expanding our CIAM solution’s API set for easier integration at end user customers and partners.”
The report says of Optimal IdM:
- “Optimal IdM has a fully cloud-hosted CIAM solution.”
- Has improved federation and LDAP integration capabilities
- Has added multitenancy support to the OptimalCloud™
Download the Full Report Today!
August / September 2020 Newsletter In this issue: Retail Chain Uses Behavioral Biometrics; CIAM Webinar; 6 CRM Security Features
Biometric MFA Deployed to US Retail Chain’s POS for Login Security
“With the implementation of TypingDNA’s behavioral biometrics solution, our users benefit from two-factor authentication while they type in their email and password to sign in,” Phil Beaudoin, Head of Enterprise Technology and Support Services said in a prepared statement. “Optimal IdM has been a great partner helping us integrate TypingDNA’s product so we can benefit from a higher degree of security while maintaining a great user experience!”
July 2020 Newsletter In this issue: New logo; Poll Results; Cloud-Based Virtual Directory; Identity Federation
New Optimal IdM Logo Testifies To Growth and Customer Service Commitment
The new logo represents our customer commitment to remain innovative and nimble through technology development and value-added partnership growth.
June 2020 Newsletter In this issue: What is Your IAM Maturity Level?; MFA Poll; Authentication Methods; IAM Leader’s Guide
3 Things To Remember On Your Path To IAM Maturity
To reach IAM maturity, businesses need a roadmap – an understanding of where they’re going and a knowledge of the milestones they should be meeting along the way. Achieving the highest level in a maturity model used to be very difficult, and few organizations were able to do it. Today, gaining maturity is far easier – but even so, most companies still get stuck.
May 2020 Newsletter In this issue: Leaders Guide to IAM; AM Poll; Review for Charity
IAM Leaders’ Guide to Access Management
IAM leaders focused on core AM tools should refer to the Gartner research mentioned here to understand the broadened scope, deployment approaches and adoption trends of AM tools.” Security and risk management leaders focused on IAM need to assess AM tool scope and deployment approaches and apply continuous adaptive risk and trust assessment approaches to AM.
April 2020 Newsletter In this issue: Pros vs. Cons of IDaaS, Virtual Identity Webinar, Optimal News: Navigating COVID-19
Pros and Cons of Using an IDaaS Solution
While more companies are opting for quality cloud-based IAM, identity as a service, or IDaaS, is not for every company. There are many benefits of IDaaS, but they come with risks as well. For example, although easily avoidable, one of the big negatives that many companies anticipate from an IDaaS solution is the danger of having to outsource critical functions.
March 2020 Newsletter In this issue: Tips for Working at Home; VIS, Federation and Other Suggested Reading Material
Tips For Working At Home – Advice From a Virtual Business Owner
With many of us now setting up shop on the dining room table to try and maintain business as usual, Larry Aucoin, managing partner of Optimal IdM, offers some advice on how to adjust to a work-at-home lifestyle.
January 2020 Newsletter In this issue: PCmag Best IAM, Gartner Critical Capabilities, Multi-Tenant Support, Executive View
PCmag Names Optimal IdM a Best Identity Management Solutions Provider in 2020
Optimal IdM is pleased to again be featured on the Best Identity Management Solutions list published by PCMag. This is the fourth consecutive year we have received an editor rating of excellent!
December 2019 Newsletter In this issue: New Partner Platform with Multi-Tenant Support , Vendors To Watch, Executive View
New Partner Platform From Optimal IdM Includes Multi-Tenant Support
The OptimalCloud™ Partner Platform, designed specifically for partners and system integrators, will include all features and benefits associated with The OptimalCloud as well as multi-tenant support and the ability to white label user interfaces. Partners will be able to create new tenants for their customers via a web portal allowing them to on-board new customers themselves.
November 2019 Newsletter In this issue: API Best Practices; Analyst Review of Optimal; Party Invite
KuppingerCole Executive View: Optimal IdM and The OptimalCloud™
Read the review from analyst firm KuppingerCole about how Optimal IdM provides a comprehensive identity management solution that provides federation, single sign-on, and strong two-factor authentication all within a private cloud. The OptimalCloud is a multiple and single-tenant SaaS offering delivering a fully managed service that provides the hosting as well as all of the configurations and customizations for the customer.
October 2019 Newsletter In this issue: Improve Customer XP with Social Sign-On; IAM Summit Discount; Ignite Dinner
Customer Experience Starts at Your Registration Screen
Social sign-ons deliver convenience and build credibility.
Social sign-ons are not meant to and should not be used to protect sensitive assets. Of greater concern is that data sharing is a two-way street. When a company uses single sign-on, it gets information such as email addresses and geographical locations from the social network; however, it also may be giving information about its users’ behaviors back to the social network. Businesses should understand which user information they are sharing when they agree to the terms of the social network.
September 2019 Newsletter In this issue: Behavioral Biometrics Explained, Authentication 101 and Virtual Directories
New Video: Behavioral Biometrics – MFA Using Keystroke Dynamics
Typing biometric authentication is a less invasive form of MFA we call simultaneous authentication, because it uses something people are already doing (typing). The passive nature of the authentication takes the burden off the user creating a frictionless and simultaneous access method. Optimal IdM uses simultaneous authentication to provide increased security and improve the MFA experience for users.
August 2019 Newsletter In this issue: Gartner Magic Quadrant, 7 Steps To Zero Trust, CIAM
2019 Gartner Magic Quadrant For Access Management Optimal IdM Positioned as Niche Player
Optimal IdM is pleased to again be named in the Gartner 2019 Magic Quadrant for Access Management. Placement in the Niche Players quadrant affirms our unique offerings that goes beyond what other AM vendors provide like:
- A single-tenant cloud model that allows for a higher level of privacy, customization and flexibility.
- A well-established heritage with VIS, an LDAP virtual directory which does not synchronize identity data, but instead references identity data in source directories in real time.
- An individualized concierge experience for each customer including direct access to engineering and the executive team.
July 2019 Newsletter In this issue: Zero Trust, META Partnership, Top CIAM Vendors, Cool List and Identiverse Recap
New Optimal IdM Partnership in META Region – Middle East, Turkey and Africa
Precise Technologies, a VAD specializing in disruptive and emerging technologies and focused on cyber security, information security, digital & cloud transformation, and AI-based analytics solutions, will now distribute and support Optimal IdM in expanding its market presence in the META region – Middle East, Turkey, and Africa.
June 2019 Newsletter In this issue: Identiverse VIP Dinner, Identity as a Firewall, CODiE Award, United AD’s
Identiverse VIP Dinner
Robin Dreeke, best-selling author and retired Chief of the Counter Intelligence Behavioral Analysis Program for the FBI, will discuss how to identify “The Insider Threat” in companies today. Hosted by Optimal IdM and Omada, we invite you to be our guest for dinner and drinks on Wednesday June 26 at 6:30 in the Shaw Ballroom at the Washington Hilton .
May 2019 Newsletter In this issue: A unified view of AD’s, Security Training, & Cloud Security
A Unified View – Top 10 Reasons To Use A Virtual Identity Server (VIS)
With a fast and easy install, a VIS provides a single, unified view of data from LDAP directories (such as eDirectory, Sun), as well as from SQL databases (such as Microsoft SQL Server, Oracle). From reporting to adding enhanced security, this whitepaper will outline some of the reasons and use cases where a Virtual Directory is needed and is the best choice.
April 2019 Newsletter In this issue: Managed Services, Biometrics, EIC contest, M&A’s
Managed Soltutions – Build vs Buy
The build versus buy dilemma is one that nearly every company debates internally. This discussion often surfaces when the I.T. department wants to consider a purchase for software that either the in-house developers or CIO feels could be done in house. Afterall, why pay for what you can do yourself? However, there are a number of variables that should drive this discussion and the final decision.
March 2019 Newsletter In this issue: United AD’s, EIC contest and 2019 Trends
WHITEPAPER: Mergers, Acquisitions and Divestitures – How to Unite Your Active Directories
CIOs that are under pressure to bring two companies’ IT systems and applications together after a merger or acquisition can unify their directory services quickly and inexpensively with a Virtual Identity Server. This paper looks at three of the leading approaches to bridging disparate sets of directory services into one seamless directory following a merger or acquisition. Conversely, we’ll look at the aspect of a divestiture, in which one company must entirely split out from another. Here, too, directory services play a role in a clean and quick divestiture or spin-off.
February 2019 Newsletter In this issue: RSA passes, EIC contest and two new webinars
IN THE NEWS
Solutions Review Presents: The Top CIAM Vendors to Watch in 2019
Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2019
January 2019 Newsletter In this issue: New partner, New whitepaper, New blog – It’s a new year!
Typing Biometrics and Other MFA Methods When Passwords Are Not Enough
81% of data breaches are from weak, default or stolen passwords. Leveraging MFA when it’s offered lessens the attack vector for digital identity impersonation attempts. This paper looks at existing MFA options, including biometric typing technology, examines decision factors for MFA and discusses the difference between various authentication methodologies.
December 2018 Newsletter In this issue: HTTP headers; GDPR in 2019; Gartner recap
Next Steps in GDPR: What’s to Come in 2019?
Optimal speaks with Kayla Matthews to discuss GDPR compliance, or more specifically, the seven key components that need to be done to remain compliant. We also talk data mapping and governance.
November 2018 Newsletter In this issue: Freebies to claim; MFA Buyers Guide; LDAP Migration
Got Tickets?
We have complimentary tickets available for the Gartner IAM Summit, but hurry! First come, first serve. Send an e-mail to marketing@optimalidm.com to claim yours.
October 2018 Newsletter In this issue: Build vs. Buy Dilemma; Retailer Challenges; Gartner IAM Summit Tickets
IAM Solutions: Build vs. Buy
The build versus buy dilemma is one that nearly every company debates internally. This discussion often surfaces when the I.T. department wants to consider a purchase for software that either the in-house developers or CIO feels could be done in house. Why pay for what you can do yourself? There are a number of variables that should drive this discussion.
September 2018 Newsletter In this issue: FIDO Compliance; Gartner Download Typing Verification
Debug Oauth2 and OpenID Connect Federation Issues
In part one we covered how to use Fiddler to debug WS-Federation issues. In part two we covered how to use Fiddler to debug SAML 2.0 federation issues. Here in part 3 we will cover how to use Fiddler to debug Oauth2 and OpenID Connect federation issues.
August 2018 Newsletter In this issue: IAM for Manufacturing; Fiddler – SAML 2.0; Biometric Typing; ISO/IEC 27001:2013 Certification
Manufacturers Need Industrial Quality Access Control
Manufacturers have valuable data that hackers want — trade secrets. Protecting this data on the network and in key systems requires ascalable and secure identity accessmanagement program
July 2018 Newsletter In this issue: Fiddler – WS Issues; Magic Quadrant; Protected Health Info; Media Interviews
Optimal IdM Named a Niche Player in the Gartner Magic Quadrant for Access Management
“We are very pleased to be placed in the Niche Players quadrant and believe it affirms our unique offering that goes beyond what other vendors in the space provide, namely the choice of having a non-shared environment. Or, in other words, a private, dedicated, secure, single tenant for the IAM space.” ~ Mike Brengs, CRO and Managing Partner of Optimal IdM
June 2018 Newsletter In this issue: Healthcare IAM and PHI; Data Security; In The News
Healthcare Industry Selects Optimal IdM as Top 10 Authorization and Authentication Solution
Optimal was selected by Black Book, an independent healthcare industry research firm, as a Top 10 Authorization and Authentication Solution!
May 2018 Newsletter In this issue: Agentless SSO; Red Sox; Know-Your-Customer; When to Sync
Know Your Credentials: The Other KYC Requirement
How do financial organizations control access and protect themselves from insider threats?
April 2018 Newsletter In this issue: Attend a Red Sox game with us!; Identity in Retail; Blockchain; Real Me; RSA Hall Pass
The Retail Renaissance: From Storefront to Data Store
Retailers invest heavily in security, but many don’t pay enough attention to their greatest vulnerability: identity and access management. One might say, identity is today’s firewall.
March 2018 Newsletter In this issue: Identity Blockchain; Context-Based Authentication; Webinar registration; Mobile App Integration
Using Context-Based Authentication and Authorization to Minimize Risk
One of the most exciting advances in identity protection today is context-based authentication and authorization. You may also hear it called “adaptive” authentication and authorization. These methods enhancing consumer safety and reduce online fraud. We explain and explore the benefits of Context-Based authentication and authorization.March-Newsletter-Optimal-IdM
February 2018 Newsletter In this issue: Black Market Passwords; Your Cyber Maturity Level; Awards and Recognition
PCMag 2018 Best Identity Management Solutions List includes Optimal IdM
For the second year in a row, Optimal IdM is featured on the Best Identity Management Solutions list put out by PCMag. Optimal IdM received 4 stars and an editor rating of Excellent.
January 2018 Newsletter In this issue: GDPR Compliance; IAM Skills Gap; MFA
Internal Hiring vs. Hiring a MSSP: Which Is Better?
One of the areas where the cybersecurity skills gap is the greatest is in the field of identity and access management (IAM).There’s no question that in today’s day and age, you need a dedicated cybersecurity team to protect your company’s data. The question is, do you dedicate some of your existing IT staff to cybersecurity or do you use a managed security service providers (MSSP) services? Naturally, there are pros and cons to each approach.
December 2017 Newsletter
Navigating a Multi-Forest Office 365 Migration Without Losing Your Mind
Expansion via acquisitions created a mutli-tenant, multi-forest problems for a company. So what should they do? Read more.
November 2017 Newsletter
Initiating Steps On The Path To GDPR Compliance
The first step to compliance is to understand your data. How can you protect something if you don’t know that you have it? Not all data is equal, so don’t treat it as such. Read more.
October 2017 Newsletter
Optimal Authenticator for iOS and Andriod
With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. See how you can get the app now on the Google and Apple app stores. Read more.
September 2017 Newsletter
Now Available on App Store – Optimal Authenticator
With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. Download the app now on the Google and Apple app stores. Read more.
August 2017 Newsletter
Beyond the Password – Technology Solutions To A Human Problem
On the surface, the security challenge is password management. Howevever, the real problem is who is using that password to access your secured systems. Read more.
July 2017 Newsletter
Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity as a Service
Optimal IdM has been positioned by KuppingerCole as a leader in the Product Leadership Matrix Category of the “Leadership Compass Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO)” report. Download our newsletter to learn more.
June 2017 Newsletter
Optimal IdM placed in 2017 Magic Quadrant for Access Management
Optimal IdM has been recognized by Gartner in their 2017 Magic Quadrant for Access Management. Download our newsletter to learn why! View the latest industry news and our upcoming events as well!
May 2017 Newsletter
New Product: Authentication-As-A-Service Offering (AaaS)
We just announced the release of our AaaS offering called Optimal Authentication Service™ (OAS). Download our newsletter to learn more about this new product and view the press release. Learn more about our upcoming events and read our featured blog post!
April 2017 Newsletter
IAM Programs Should Strive for Four 9’s
Download our April Newsletter for the latest information and the blog of the month. Don’t miss an opportunity to join us on 4/21 for a complimentary lunch and lively discussion about your IAM options. RSVP in this newsletter!
March 2017 Newsletter
Bridging the Protocol Gap on Cloud Identity Project
Download this newsletter for the latest blog, featured video, and register for our webinar. This technical presentation will cover the origin of protocols and when to use them, best options to use with mobile apps, how to deal with situations outside of specifications, security concerns to consider. Register for this Webinar today!
February 2017 Newsletter
Why Customers Choose The OptimalCloud™ For Cloud-Based SSO
The OptimalCloud can be a private or public federated cloud service that provides multi-factor and mobile authentication and authorization from any data store. Download the featured Whitepaper and more in February’s newsletter!
January 2017 Newsletter
Understanding Cost Differences Between IDaaS and On-Premise Deployments
So you’ve decided to integrate an identity management system for your business. Congratulations! Now what? View our blog of the month for January to learn more and read about our upcoming events.