April 2020 Newsletter In this issue: Pros vs. Cons of IDaaS, Virtual Identity Webinar, Optimal News: Navigating COVID-19
While more companies are opting for quality cloud-based IAM, identity as a service, or IDaaS, is not for every company. There are many benefits of IDaaS, but they come with risks as well. For example, although easily avoidable, one of the big negatives that many companies anticipate from an IDaaS solution is the danger of having to outsource critical functions.
March 2020 Newsletter In this issue: Tips for Working at Home; VIS, Federation and Other Suggested Reading Material
With many of us now setting up shop on the dining room table to try and maintain business as usual, Larry Aucoin, managing partner of Optimal IdM, offers some advice on how to adjust to a work-at-home lifestyle.
January 2020 Newsletter In this issue: PCmag Best IAM, Gartner Critical Capabilities, Multi-Tenant Support, Executive View
Optimal IdM is pleased to again be featured on the Best Identity Management Solutions list published by PCMag. This is the fourth consecutive year we have received an editor rating of excellent!
December 2019 Newsletter In this issue: New Partner Platform with Multi-Tenant Support , Vendors To Watch, Executive View
The OptimalCloud™ Partner Platform, designed specifically for partners and system integrators, will include all features and benefits associated with The OptimalCloud as well as multi-tenant support and the ability to white label user interfaces. Partners will be able to create new tenants for their customers via a web portal allowing them to on-board new customers themselves.
November 2019 Newsletter In this issue: API Best Practices; Analyst Review of Optimal; Party Invite
Read the review from analyst firm KuppingerCole about how Optimal IdM provides a comprehensive identity management solution that provides federation, single sign-on, and strong two-factor authentication all within a private cloud. The OptimalCloud is a multiple and single-tenant SaaS offering delivering a fully managed service that provides the hosting as well as all of the configurations and customizations for the customer.
October 2019 Newsletter In this issue: Improve Customer XP with Social Sign-On; IAM Summit Discount; Ignite Dinner
Social sign-ons deliver convenience and build credibility.
Social sign-ons are not meant to and should not be used to protect sensitive assets. Of greater concern is that data sharing is a two-way street. When a company uses single sign-on, it gets information such as email addresses and geographical locations from the social network; however, it also may be giving information about its users’ behaviors back to the social network. Businesses should understand which user information they are sharing when they agree to the terms of the social network.
September 2019 Newsletter In this issue: Behavioral Biometrics Explained, Authentication 101 and Virtual Directories
Typing biometric authentication is a less invasive form of MFA we call simultaneous authentication, because it uses something people are already doing (typing). The passive nature of the authentication takes the burden off the user creating a frictionless and simultaneous access method. Optimal IdM uses simultaneous authentication to provide increased security and improve the MFA experience for users.
August 2019 Newsletter In this issue: Gartner Magic Quadrant, 7 Steps To Zero Trust, CIAM
Optimal IdM is pleased to again be named in the Gartner 2019 Magic Quadrant for Access Management. Placement in the Niche Players quadrant affirms our unique offerings that goes beyond what other AM vendors provide like:
- A single-tenant cloud model that allows for a higher level of privacy, customization and flexibility.
- A well-established heritage with VIS, an LDAP virtual directory which does not synchronize identity data, but instead references identity data in source directories in real time.
- An individualized concierge experience for each customer including direct access to engineering and the executive team.
July 2019 Newsletter In this issue: Zero Trust, META Partnership, Top CIAM Vendors, Cool List and Identiverse Recap
Precise Technologies, a VAD specializing in disruptive and emerging technologies and focused on cyber security, information security, digital & cloud transformation, and AI-based analytics solutions, will now distribute and support Optimal IdM in expanding its market presence in the META region – Middle East, Turkey, and Africa.
June 2019 Newsletter In this issue: Identiverse VIP Dinner, Identity as a Firewall, CODiE Award, United AD’s
Robin Dreeke, best-selling author and retired Chief of the Counter Intelligence Behavioral Analysis Program for the FBI, will discuss how to identify “The Insider Threat” in companies today. Hosted by Optimal IdM and Omada, we invite you to be our guest for dinner and drinks on Wednesday June 26 at 6:30 in the Shaw Ballroom at the Washington Hilton .
May 2019 Newsletter In this issue: A unified view of AD’s, Security Training, & Cloud Security
With a fast and easy install, a VIS provides a single, unified view of data from LDAP directories (such as eDirectory, Sun), as well as from SQL databases (such as Microsoft SQL Server, Oracle). From reporting to adding enhanced security, this whitepaper will outline some of the reasons and use cases where a Virtual Directory is needed and is the best choice.
April 2019 Newsletter In this issue: Managed Services, Biometrics, EIC contest, M&A’s
The build versus buy dilemma is one that nearly every company debates internally. This discussion often surfaces when the I.T. department wants to consider a purchase for software that either the in-house developers or CIO feels could be done in house. Afterall, why pay for what you can do yourself? However, there are a number of variables that should drive this discussion and the final decision.
March 2019 Newsletter In this issue: United AD’s, EIC contest and 2019 Trends
CIOs that are under pressure to bring two companies’ IT systems and applications together after a merger or acquisition can unify their directory services quickly and inexpensively with a Virtual Identity Server. This paper looks at three of the leading approaches to bridging disparate sets of directory services into one seamless directory following a merger or acquisition. Conversely, we’ll look at the aspect of a divestiture, in which one company must entirely split out from another. Here, too, directory services play a role in a clean and quick divestiture or spin-off.
February 2019 Newsletter In this issue: RSA passes, EIC contest and two new webinars
January 2019 Newsletter In this issue: New partner, New whitepaper, New blog – It’s a new year!
Typing Biometrics and Other MFA Methods When Passwords Are Not Enough
81% of data breaches are from weak, default or stolen passwords. Leveraging MFA when it’s offered lessens the attack vector for digital identity impersonation attempts. This paper looks at existing MFA options, including biometric typing technology, examines decision factors for MFA and discusses the difference between various authentication methodologies.
December 2018 Newsletter In this issue: HTTP headers; GDPR in 2019; Gartner recap
Optimal speaks with Kayla Matthews to discuss GDPR compliance, or more specifically, the seven key components that need to be done to remain compliant. We also talk data mapping and governance.
November 2018 Newsletter In this issue: Freebies to claim; MFA Buyers Guide; LDAP Migration
We have complimentary tickets available for the Gartner IAM Summit, but hurry! First come, first serve. Send an e-mail to email@example.com to claim yours.
October 2018 Newsletter In this issue: Build vs. Buy Dilemma; Retailer Challenges; Gartner IAM Summit Tickets
The build versus buy dilemma is one that nearly every company debates internally. This discussion often surfaces when the I.T. department wants to consider a purchase for software that either the in-house developers or CIO feels could be done in house. Why pay for what you can do yourself? There are a number of variables that should drive this discussion.
September 2018 Newsletter In this issue: FIDO Compliance; Gartner Download Typing Verification
In part one we covered how to use Fiddler to debug WS-Federation issues. In part two we covered how to use Fiddler to debug SAML 2.0 federation issues. Here in part 3 we will cover how to use Fiddler to debug Oauth2 and OpenID Connect federation issues.
August 2018 Newsletter In this issue: IAM for Manufacturing; Fiddler – SAML 2.0; Biometric Typing; ISO/IEC 27001:2013 Certification
Manufacturers have valuable data that hackers want — trade secrets. Protecting this data onthe network and in key systems requires ascalable and secure identity accessmanagement program
July 2018 Newsletter In this issue: Fiddler – WS Issues; Magic Quadrant; Protected Health Info; Media Interviews
“We are very pleased to be placed in the Niche Players quadrant and believe it affirms our unique offering that goes beyond what other vendors in the space provide, namely the choice of having a non-shared environment. Or, in other words, a private, dedicated, secure, single tenant for the IAM space.” ~ Mike Brengs, CRO and Managing Partner of Optimal IdM
June 2018 Newsletter In this issue: Healthcare IAM and PHI; Data Security; In The News
Optimal was selected by Black Book, an independent healthcare industry research firm, as a Top 10 Authorization and Authentication Solution!
May 2018 Newsletter In this issue: Agentless SSO; Red Sox; Know-Your-Customer; When to Sync
How do financial organizations control access and protect themselves from insider threats?
April 2018 Newsletter In this issue: Attend a Red Sox game with us!; Identity in Retail; Blockchain; Real Me; RSA Hall Pass
Retailers invest heavily in security, but many don’t pay enough attention to their greatest vulnerability: identity and access management. One might say, identity is today’s firewall.
March 2018 Newsletter In this issue: Identity Blockchain; Context-Based Authentication; Webinar registration; Mobile App Integration
One of the most exciting advances in identity protection today is context-based authentication and authorization. You may also hear it called “adaptive” authentication and authorization. These methods enhancing consumer safety and reduce online fraud. We explain and explore the benefits of Context-Based authentication and authorization.March-Newsletter-Optimal-IdM
February 2018 Newsletter In this issue: Black Market Passwords; Your Cyber Maturity Level; Awards and Recognition
For the second year in a row, Optimal IdM is featured on the Best Identity Management Solutions list put out by PCMag. Optimal IdM received 4 stars and an editor rating of Excellent.
January 2018 Newsletter In this issue: GDPR Compliance; IAM Skills Gap; MFA
One of the areas where the cybersecurity skills gap is the greatest is in the field of identity and access management (IAM).There’s no question that in today’s day and age, you need a dedicated cybersecurity team to protect your company’s data. The question is, do you dedicate some of your existing IT staff to cybersecurity or do you use a managed security service providers (MSSP) services? Naturally, there are pros and cons to each approach.
December 2017 Newsletter
Expansion via acquisitions created a mutli-tenant, multi-forest problems for a company. So what should they do? Read more.
November 2017 Newsletter
The first step to compliance is to understand your data. How can you protect something if you don’t know that you have it? Not all data is equal, so don’t treat it as such. Read more.
October 2017 Newsletter
With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. See how you can get the app now on the Google and Apple app stores. Read more.
September 2017 Newsletter
With the Optimal Authenticator, quickly and securely verify your identity for access to all of your applications using two-factor authentication. Download the app now on the Google and Apple app stores. Read more.
August 2017 Newsletter
On the surface, the security challenge is password management. Howevever, the real problem is who is using that password to access your secured systems. Read more.
July 2017 Newsletter
Optimal IdM has been positioned by KuppingerCole as a leader in the Product Leadership Matrix Category of the “Leadership Compass Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO)” report. Download our newsletter to learn more.
June 2017 Newsletter
Optimal IdM has been recognized by Gartner in their 2017 Magic Quadrant for Access Management. Download our newsletter to learn why! View the latest industry news and our upcoming events as well!
May 2017 Newsletter
We just announced the release of our AaaS offering called Optimal Authentication Service™ (OAS). Download our newsletter to learn more about this new product and view the press release. Learn more about our upcoming events and read our featured blog post!
April 2017 Newsletter
Download our April Newsletter for the latest information and the blog of the month. Don’t miss an opportunity to join us on 4/21 for a complimentary lunch and lively discussion about your IAM options. RSVP in this newsletter!
March 2017 Newsletter
Download this newsletter for the latest blog, featured video, and register for our webinar. This technical presentation will cover the origin of protocols and when to use them, best options to use with mobile apps, how to deal with situations outside of specifications, security concerns to consider. Register for this Webinar today!
February 2017 Newsletter
The OptimalCloud can be a private or public federated cloud service that provides multi-factor and mobile authentication and authorization from any data store. Download the featured Whitepaper and more in February’s newsletter!
January 2017 Newsletter
So you’ve decided to integrate an identity management system for your business. Congratulations! Now what? View our blog of the month for January to learn more and read about our upcoming events.