August 2018 Newsletter In this issue: IAM for Manufacturing; Fiddler – SAML 2.0; Biometric Typing; ISO/IEC 27001:2013 Certification

Manufacturers Need Industrial Quality Access Control

Manufacturers have valuable data that hackers want — trade secrets. Protecting this data onthe network and in key systems requires ascalable and secure identity accessmanagement program

July 2018 Newsletter

In this issue: Fiddler – WS Issues; Magic Quadrant; Protected Health Info; Media Interviews

Optimal IdM Named a Niche Player in the Gartner Magic Quadrant for Access Management

“We are very pleased to be placed in the Niche Players quadrant and believe it affirms our unique offering that goes beyond what other vendors in the space provide, namely the choice of having a non-shared environment. Or, in other words, a private, dedicated, secure, single tenant for the IAM space.” ~ Mike Brengs, CRO and Managing Partner of Optimal IdM

June 2018 Newsletter In this issue: Healthcare IAM and PHI; Data Security; In The News

Healthcare Industry Selects Optimal IdM as Top 10 Authorization and Authentication Solution

Optimal was selected by Black Book, an independent healthcare industry research firm, as a Top 10 Authorization and Authentication Solution!

May 2018 Newsletter In this issue: Agentless SSO; Red Sox; Know-Your-Customer; When to Sync

Know Your Credentials: The Other KYC Requirement

How do financial organizations control access and protect themselves from insider threats?

April 2018 Newsletter In this issue: Attend a Red Sox game with us!; Identity in Retail; Blockchain; Real Me; RSA Hall Pass

The Retail Renaissance: From Storefront to Data Store

Retailers invest heavily in security, but many don’t pay enough attention to their greatest vulnerability: identity and access management. One might say, identity is today’s firewall.

March 2018 Newsletter In this issue: Identity Blockchain; Context-Based Authentication; Webinar registration; Mobile App Integration

Using Context-Based Authentication and Authorization to Minimize Risk

One of the most exciting advances in identity protection today is context-based authentication and authorization. You may also hear it called “adaptive” authentication and authorization. These methods enhancing consumer safety and reduce online fraud. We explain and explore the benefits of Context-Based authentication and authorization.March-Newsletter-Optimal-IdM

February 2018 Newsletter In this issue: Black Market Passwords; Your Cyber Maturity Level; Awards and Recognition

PCMag 2018 Best Identity Management Solutions List includes Optimal IdM

For the second year in a row, Optimal IdM is featured on the Best Identity Management Solutions list put out by PCMag. Optimal IdM received 4 stars and an editor rating of Excellent.

January 2018 Newsletter In this issue: GDPR Compliance; IAM Skills Gap; MFA

Internal Hiring vs. Hiring a MSSP: Which Is Better?

One of the areas where the cybersecurity skills gap is the greatest is in the field of identity and access management (IAM).There’s no question that in today’s day and age, you need a dedicated cybersecurity team to protect your company’s data. The question is, do you dedicate some of your existing IT staff to cybersecurity or do you use a managed security service providers (MSSP) services? Naturally, there are pros and cons to each approach.

December 2017 Newsletter

Navigating a Multi-Forest Office 365 Migration Without Losing Your Mind

Expansion via acquisitions created a mutli-tenant, multi-forest problems for a company. So what should they do? Read more.

November 2017 Newsletter

Initiating Steps On The Path To GDPR Compliance

The first step to compliance is to understand your data. How can you protect something if you don’t know that you have it? Not all data is equal, so don’t treat it as such. Read more.

October 2017 Newsletter

Optimal Authenticator for iOS and Andriod

With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. See how you can get the app now on the Google and Apple app stores. Read more.

September 2017 Newsletter

Now Available on App Store – Optimal Authenticator

With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. Download the app now on the Google and Apple app stores. Read more.

August 2017 Newsletter

Beyond the Password – Technology Solutions To A Human Problem

On the surface, the security challenge is password management. Howevever, the real problem is who is using that password to access your secured systems. Read more.

July 2017 Newsletter

Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity as a Service

Optimal IdM has been positioned by KuppingerCole as a leader in the Product Leadership Matrix Category of the “Leadership Compass Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO)” report. Download our newsletter to learn more.

June 2017 Newsletter

Optimal IdM placed in 2017 Magic Quadrant for Access Management

Optimal IdM has been recognized by Gartner in their 2017 Magic Quadrant for Access Management. Download our newsletter to learn why! View the latest industry news and our upcoming events as well!

May 2017 Newsletter

New Product: Authentication-As-A-Service Offering (AaaS)

We just announced the release of our AaaS offering called Optimal Authentication Service™ (OAS). Download our newsletter to learn more about this new product and view the press release. Learn more about our upcoming events and read our featured blog post!

April 2017 Newsletter

IAM Programs Should Strive for Four 9’s

Download our April Newsletter for the latest information and the blog of the month. Don’t miss an opportunity to join us on 4/21 for a complimentary lunch and lively discussion about your IAM options. RSVP in this newsletter!

March 2017 Newsletter

Bridging the Protocol Gap on Cloud Identity Project

Download this newsletter for the latest blog, featured video, and register for our webinar. This technical presentation will cover the origin of protocols and when to use them, best options to use with mobile apps, how to deal with situations outside of specifications, security concerns to consider. Register for this Webinar today!

February 2017 Newsletter

Why Customers Choose The OptimalCloud™ For Cloud-Based SSO

The OptimalCloud can be a private or public federated cloud service that provides multi-factor and mobile authentication and authorization from any data store. Download the featured Whitepaper and more in February’s newsletter!

January 2017 Newsletter

Understanding Cost Differences Between IDaaS and On-Premise Deployments

So you’ve decided to integrate an identity management system for your business. Congratulations! Now what? View our blog of the month for January to learn more and read about our upcoming events.