behavioral biometrics authentication

Video Behavioral Biometrics – MFA Using Keystroke Dynamics

{ "@context": "https://schema.org", "@type": "VideoObject", "name": "Behavioral Biometrics - MFA Using Keystroke Dynamics", "description": "Typing biometric authentication is a less invasive form of MFA we call simultaneous authentication, because it uses something people are already doing. The passive nature of the authentication takes the burden off the user creating a frictionless and simultaneous access method. Optimal IdM uses simultaneous authentication to provide increased security and improve the MFA experience for users.", "thumbnailUrl": "https://i.vimeocdn.com/video/814516894_1280.jpg", "uploadDate": "2019-09-16", "duration": "PT1M5S", "publisher": { "@type": "Organization", "name": "Optimal", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://vimeo.com/360360800", "embedUrl": "https://player.vimeo.com/video/360360800" }

IAM - OptimalCloud Webinar

Video IAM And The Emerging Cloud-First Mindset – A Look At The OptimalCloud

At the perimeter of network security is Identity and Access Management (IAM). If the ability to scale an IAM program due to growth or acquisition is impractical, an organization’s security and financial resources become strained putting pressure directly on IT executives and staff. Scalability and flexibility are fundamentals of both on-premises and cloud-based IAM solutions. Or are they? This webinar will consider these issues and look inside our cloud federation and single sign-on solution offering, The OptimalCloud™. We will also review the following: Criteria for choosing an IAM solution Why move to the cloud – Cloud vs. On-Premise Comparison What exactly is The OptimalCloud The OptimalCloud – Competitive Comparison { "@context": "https://schema.org", "@type": "VideoObject", "name": "IAM And The Emerging Cloud-First Mindset - A Look At The OptimalCloud", "description": "At the perimeter of network security is Identity and Access Management (IAM). If the ability to scale an IAM program due to growth or acquisition is impractical, an organization's security and financial resources become strained putting pressure directly on IT executives and staff. Scalability and flexibility are fundamentals of both on-premises and cloud-based IAM solutions. Or are they? This webinar will consider these issues and look inside our cloud federation and single sign-on solution offering, The OptimalCloud™. We will also review the following: • Criteria for choosing an IAM solution • Why move to the cloud - Cloud vs. On-Premise Comparison • What exactly is The OptimalCloud • The OptimalCloud - Competitive Comparison", "thumbnailUrl": "https://i.ytimg.com/vi/kiANRdqyy4k/hqdefault.jpg", "uploadDate": "2019-03-01", "duration": "PT44M42S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/kiANRdqyy4k", "embedUrl": "https://www.youtube.com/embed/kiANRdqyy4k" }

Video The Future of Authentication: Behavioral Biometrics, Tokenless MFA & Adaptive Authentication

Frictionless authentication by the way you type? Yes it’s true. Learn how this and other MFA solutions are changing the login landscape. Topics include: New Apps, New Threats, Same Authentication What are Ineffective Passwords? MFA Tipping Points Adaptive Access Control What is Behavioral Biometrics? { "@context": "https://schema.org", "@type": "VideoObject", "name": "The Future of Authentication: Behavioral Biometrics, Tokenless MFA & Adaptive Authentication", "description": "Frictionless authentication by the way you type? Yes it's true. Learn how this and other Multi-factor Authentication solutions are changing the login landscape. We will co-present this webinar with our new partner, TypingDNA. Topics include: • New Apps, New Threats, Same Authentication • What are Ineffective Passwords? • MFA Tipping Points • Adaptive Access Control • What is Behavioral Biometrics?", "thumbnailUrl": "https://i.ytimg.com/vi/VQeCoBZ5DmQ/hqdefault.jpg", "uploadDate": "2019-02-27", "duration": "PT52M14S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/VQeCoBZ5DmQ", "embedUrl": "https://www.youtube.com/embed/VQeCoBZ5DmQ" }

How A Major Retailer Successfully Performed a Divestiture v3

Video How A Major Retailer Successfully Performed a Divestiture

This webinar will cover aspects of how a retailer successfully transitioned from the parent company to a 100% cloud based managed service offering. This retailer is “all in on the cloud”, having no on-premise infrastructure even having their active directory hosted in the cloud. Hear how they rapidly integrated into multiple cloud applications including Office 365, migrating from the parent company’s on-prem exchange. We will cover approach, what worked and lessons learned. { "@context": "https://schema.org", "@type": "VideoObject", "name": "How A Major Retailer Successfully Performed a Divestiture v3", "description": "This webinar will cover aspects of how a retailer successfully transitioned to a 100% cloud based managed service offering, having their active directory hosted in the cloud, and integrating into multiple cloud applications including Office 365. We will cover approach, what worked and lessons learned.", "thumbnailUrl": "https://i.ytimg.com/vi/qEyUd4QjX8E/hqdefault.jpg", "uploadDate": "2018-03-21", "duration": "PT16M4S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/qEyUd4QjX8E", "embedUrl": "https://www.youtube.com/embed/qEyUd4QjX8E" }

optimal-cloud-login-screen

Video The OptimalCloud

(2 minutes 30 seconds) The OptimalCloud (2 minutes 30 seconds) Provides a product overview and discusses the full benefits of The OptimalCloud. { "@context": "https://schema.org", "@type": "VideoObject", "name": "The OptimalCloud", "description": "The OptimalCloud is a comprehensive cloud federation and single sign on solution that can serve all of your identity management and password needs. With the OptimalCloud you can securely access all your applications instantly by only logging in one time. No more forgotten passwords or locked accounts. No more mundane password resets. The OptimalCloud is a private cloud built for the enterprise Fortune500 with private dedicated servers for each customer offering the utmost in security. It’s fully customizable to your organization’s needs and is offered at an affordable, flat, monthly fee.", "thumbnailUrl": "https://i.ytimg.com/vi/1dhM_-D5WZo/hqdefault.jpg", "uploadDate": "2016-05-11", "duration": "PT2M35S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://www.youtube.com/watch?v=1dhM_-D5WZo", "embedUrl": "https://www.youtube.com/embed/1dhM_-D5WZo" }

deployment-scenarios

Video OptimalCloud Deployment Scenarios

(2 minutes 40 seconds) The OptimalCloud Deployment Scenarios (2 minutes 40 seconds)
Discusses several deployment scenarios for The OptimalCloud. { "@context": "https://schema.org", "@type": "VideoObject", "name": "The OptimalCloud – Deployment Scenarios", "description": "The OptimalCloud is a complete cloud federation and single sign-on solution that provides multi-factor authentication and authorization from any data store. There are several deployment scenarios that make The OptimalCloud the perfect fit for your organization’s identity management needs.", "thumbnailUrl": "https://i.ytimg.com/vi/mOLVK0CAzng/hqdefault.jpg", "uploadDate": "2016-08-01", "duration": "PT2M40S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://www.youtube.com/watch?v=mOLVK0CAzng", "embedUrl": "https://www.youtube.com/embed/mOLVK0CAzng" }

VIS for Federation Services

Video Virtual Identity Server for Federation Services

(10 minutes) Virtual Identity Server for Federation Services (10 minutes)
Provides an overview of the Virtual Identity Server for Federation Services { "@context": "https://schema.org", "@type": "VideoObject", "name": "Virtual Identity Server Federation Services - Overview", "description": "An over view of Optimal IdM's Virtual Identity Server Federation Services. The Lightweight Directory Access Protocol (LDAP) Virtual Directory includes an Identity Provider (IP) Security Token Service (STS) that can authenticate users wherever they reside such as: LDAP directories, SQL databases, and multiple Active Directories (without forest trusts). Additionally, The STS can be trusted by and leveraged within an existing ADFS deployment, allowing ADFS to easily authenticate users against data stores other than Active Directory such as Sun, eDirectory or even a database. The Virtual Identity Server Federation Services also provides an ADFS deployment with additional out-of-the-box (OOB) authentication methods such as: traditional user id and password (basic), Windows Integrated Authentication, single-sign-on (SSO) to and from other systems, as well as Department of Defense Common Access Card (CAC) authentication.", "thumbnailUrl": "https://i.ytimg.com/vi/XB_GGKmppMg/hqdefault.jpg", "uploadDate": "2014-02-10", "duration": "PT10M12S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/XB_GGKmppMg", "embedUrl": "https://www.youtube.com/embed/XB_GGKmppMg" }

Video Virtual Identity Server for SharePoint

(10 minutes) Virtual Identity Server for SharePoint Hands-On-Demo (10 minutes) { "@context": "https://schema.org", "@type": "VideoObject", "name": "Optimal IdM's Virtual Identity Server for SharePoint - Overview", "description": "An overview of Optimal IdM's Virtual Identity Server for SharePoint.", "thumbnailUrl": "https://i.ytimg.com/vi/2Dgioh8uJms/hqdefault.jpg", "uploadDate": "2014-02-10", "duration": "PT9M57S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/2Dgioh8uJms", "embedUrl": "https://www.youtube.com/embed/2Dgioh8uJms" }

Video Optimal People Picker for SharePoint

Optimal People Picker Overview (8 minutes)
Provides an overview of the Optimal People Picker { "@context": "https://schema.org", "@type": "VideoObject", "name": "Optimal People Picker / Claims Provider - Overview", "description": "An overview of Optimal IdM's People Picker and Claims Provider for SharePoint 2010/2013. The Optimal People Picker is a vendor supported federated claims provider that re-enables search capabilities for users and groups in SharePoint within on-premise directories. This is an overview of the SharePoint claims provider.", "thumbnailUrl": "https://i.ytimg.com/vi/jqRd2z4EKqc/hqdefault.jpg", "uploadDate": "2014-02-10", "duration": "PT8M2S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/jqRd2z4EKqc", "embedUrl": "https://www.youtube.com/embed/jqRd2z4EKqc" }

video bridging the protocol gap in cloud identity services

Video Webinar: Bridging The Protocol Gap On Cloud Identity Projects

(40 minutes 50 seconds) Webinar: Bridging The Protocol Gap On Cloud Identity Projects (40 minutes 50 seconds) Bridging the divide between newer authorization and federation protocols such as OAuth2 and OpenID Connect and connecting to older federation protocols such as SAML2 and WS-Federation presents some unique challenges. We will discuss those challenges and look at some practical, real world solutions. Various web applications, thick clients, and web services will be reviewed. This technical presentation will cover: Origin of protocols and when to use them Best options to use with mobile apps How to deal with situations outside of specifications Security concerns to consider { "@context": "https://schema.org", "@type": "VideoObject", "name": "Bridging The Protocol Gap On Cloud Identity Projects", "description": "Bridging the divide between newer authorization and federation protocols such as OAuth2 and OpenID Connect and connecting to older federation protocols such as SAML2 and WS-Federation presents some unique challenges. We will discuss those challenges and look at some practical, real world solutions. Various web applications, thick clients, and web services will be reviewed. This technical presentation will cover: * Origin of protocols and when to use them * Best options to use with mobile apps * How to deal with situations outside of specifications * Security concerns to consider", "thumbnailUrl": "https://i.ytimg.com/vi/MjXVww6ZnpQ/hqdefault.jpg", "uploadDate": "2017-03-24", "duration": "PT40M50S", "publisher": { "@type": "Organization", "name": "Optimal IdM", "logo": { "@type": "ImageObject", "url": "https://optimalidm.com/wp-content/themes/optimal-idm/images/sitelogo.png", "width": 156, "height": 53 } }, "contentUrl": "https://youtu.be/MjXVww6ZnpQ", "embedUrl": "https://www.youtube.com/embed/MjXVww6ZnpQ" }

Just a few things . . .




 

By clicking Submit, you consent for us to use your personal data for sales and marketing efforts. If this is unacceptable, please contact us via telephone.