Posts
- Optimal IdM Partners With BMC Software
- Brengs to Lead Optimal IdM Identity Management Practice
- Dickerson to Join Optimal IdM Identity Management Practice
- Optimal IdM Extends BMC© With The Release Of The Dashboard
- Optimal IdM Partners with Quest Software
- Optimal IdM Signs As Sponsor of the Directory Experts Conference
- Brengs to Speak At the Directory Experts Conference 2008
- Optimal IdM Introduces Virtual Identity Server™
- Optimal IdM’s VIS™ Provides Multi-Forest Capabilities
- Optimal IdM Releases Next Generation Of Virtual Identity Server™
- Optimal IdM Releases Next Generation of Virtual Identity Server™
- Optimal IdM Signs As Sponsor of Directory Experts Conference 2009
- Brengs to Speak At the Experts Conference in Las Vegas
- Optimal IdM Releases Enhanced VIS™ for Sharepoint
- Optimal IDM Releases Enhanced Virtual Identity Server™
- Optimal IDM Releases Latest Adapter for Novell eDirectory
- Optimal IDM Releases Microsoft SQL Server 2008 Adapter for VIS
- Optimal IDM Ships VIS LDAP Proxy Firewall Edition
- Optimal IDM Enhances Cloud Computing with User Provision Solution
- Optimal IDM Signs As Gold Sponsor of TEC 2010
- Optimal IDM Announces DSML Support for Its VIS
- Optimal IDM Announces Support for Sharepoint 2010
- Optimal IDM Signs on to Sponsor SPTechCon
- Optimal IDM Releases Optimal People Picker for Sharepoint 2010
- Optimal IDM Gold Sponsor of the Experts Conference 2011
- Optimal IDM Announces New Product That Integrates with ADFS 2.0
- Optimal IDM Announces Addition Of Jeffrey Bohren
- Optimal IDM Signs On As a Gold Sponsor of the Experts Conference
- Optimal IDM Announces Doubling Software Sales Revenue
- Optimal IDM Announces Virtual Identity Server for Office 365
- Optimal IDM Announces Interoperability with Microsoft Office 365
- Optimal IdM Announces the Virtual Identity Server as an API
- Optimal IDM’s Virtual Identity Server Wins Best of Tech Ed 2013
- Optimal IDM’s Virtual Identity Server Wins Best Of Tech Ed 2014
- Optimal Idm Named 100 Most Promising Microsoft Solution Provider
- Optimal IdM to Release TOTP in The OptimalCloud
- A Virtual Directory Server (VDS) Is a Swiss Army Knife That Enterprise Architects Cannot Be Without
- Webinar: What’s New, What’s Next at Optimal IdM
- Benefits of a Cloud Federation Broker
- Bridging the OAuth2/SAML2 Divide
- Cloud Federation & SSO Vendor Comparison
- Stop Data Leakage. Don’t Be the Next High-Profile Hack
- LDAP Migrations Made Easy
- That Synching Feeling I Get From Cloud SSO
- It’s So Meta (data)
- Kerberos, The Three Headed Dog of Identity
- Why You Need TOTP
- Optimal IdM’s Mike Brengs featured on ISACA
- Get Out of the Authentication Business
- More Reliability and Security for Your Enterprise
- The Way to a Hacker’s Heart: Insecure Passwords
- Why You Should Consider The OptimalCloud
- Why Customers Choose The OptimalCloud For Cloud Based SSO
- The OptimalCloud and Google Apps for Work
- The OptimalCloud Deployment Scenarios
- Data Security and the Internet of Things
- Mobile SSO
- 7 Common Security Mistakes
- The Password Problem
- Security Issues for the Semantic Web
- Demystifying Security in “The Cloud”
- Best Practices for Better UX and Security
- Why Your Business Needs an Identity Hub
- How to Evaluate Your Identity Management System
- Navigating a Multi-Forest Office 365 Migration Without Losing Your Mind
- Does IoT Have an Identity Management Problem?
- Optimal IdM Offers Stand Alone Multi-Factor Authentication-As-A-Service
- Three Reasons to Consider Cloud SSO for Apps
- Five Things CMOs Need to Know About Customer Identity and Access Management
- A Password-Free World: Past, Present or Possible Future?
- IAM Programs Should Strive for Four 9’s
- The OptimalCloud for Cloud Based Application Vendors
- Understanding Costs Differences Between IDaaS and On-Premise Deployments
- Using the Virtual Identity Server (VIS) To Migrate From One LDAP Platform To Another Platform
- 101 Uses for a Virtual Directory
- Optimal IdM Releases Authentication-As-A-Service Offering
- Optimal IdM Featured On The Best Identity Management Solutions List of 2017
- Cybersecurity Dangerously Lax at Mar-a-Lago
- Using IAM Tools To Cut The Costs of a Data Breach
- Optimal IdM Positioned in the Niche Players Quadrant of the Gartner Magic Quadrant for Access Management
- Cloud Provisioning – The Good, Bad, and the Ugly
- Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity as a Service: Single Sign-On to the Cloud Report
- Optimal IdM Names Chris Curcio as Vice President, Channel Sales Division
- Using MFA for Server Access Thanks to the Optimal GINA™ Plugin
- Enterprise Identity Management Tools Keep Cloud Hackers at Bay
- Podcast on ITSP Radio
- Optimal IdM Appoints Industry Veteran Mark Foust as Director of Worldwide Sales
- Top 5 Road-Blocks Migrating To A Cloud Identity and SSO Solution
- Cybersecurity Threats Your Employees Should Know About
- Buyer’s Guide to Multi-Factor Authentication (MFA)
- Optimal IdM Honored with CyberSecurity Breakthrough Award
- Do You Know Who You’re Letting Inside Your Networks?
- Protecting Critical Infrastructure from Cyber Threats
- Why Is Identity and Access Management Important?
- Four Simple Steps to Online Safety
- PODCAST: How Identity Access Management (IAM) Authenticates Network Connections
- Hybrid Cloud Security Challenges Remain Tough To Overcome
- Initiating Steps On The Path To GDPR Compliance
- Optimal IdM Now OpenID Connect Certified
- Top 10 Reasons for the Virtual Identity Server (VIS)
- How I Became a Senior Software Architect
- ‘Extending The Mine’: Inside Day 2 Of The Cyber Security Exchange
- Optimal IdM Chief Software Engineer Jeff Bohren to Present at InfoSec World 2018
- GDPR Compliance – Assessing Data Controls and Risk Management
- Keeper Security Patches Password Protection Flaw Reported by Google
- Why Do Data Breaches Happen?
- Internal Hiring vs. Hiring a MSSP: Which Is Better?
- Optimal IdM Honored with Homeland Security Award from Government Security News
- IAM Addresses Help Desk Issues
- Enterprise CIO
- GDPR and Governance
- Boost Your Cyber Maturity Level with IAM
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2018
- Old Logins are White Hot on the Dark Market: American Security Today
- Optimal IdM Chief Revenue Officer Mike Brengs to Preside on Panel at the 2018 KNOW Identity Conference
- SharePoint for Government – Is Seamless AND Secure Authentication Possible?
- Optimal IdM Announces Customer Support for GDPR
- Integrate Your Mobile Applications Into Your Company
- The Fundamentals of Blockchain
- State Insecurity: Why Are Top NSA Personnel Leaving in Droves
- Optimal IdM Awarded USF Fast 56
- The Barriers to Entry for Blockchain
- RealMe Integration Services from Optimal IdM
- 8 Hot Cyber Security Trends (and 4 Going Cold): CSO Online
- Identity Blockchain: Identity Trust Fabric
- Privileged Access Management 101
- Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine
- Finding the Right Consumer IAM Products
- When to Synchronize, Virtualize and Federate Data in the Enterprise
- Agentless SSO – What’s The Big Deal?
- Podcast: The Charles Tendell Show
- Know Your Credentials: The Other KYC Requirement
- Healthcare Industry Selects Optimal IdM as Top 10 Authorization and Authentication Solution
- How Privacy Is Moving Data Security To The Top Of Corporate Agendas: CSO and IT News
- Video Interview: Terri Robinson, Executive Editor of SC Media, speaks with Optimal IdM
- Protecting Your Patient’s PHI Data
- Should U.S. Companies Be GDPR Compliant? Yes!
- Podcast: Mark Foust Inteview with John Dasher, Editor ITSPmagazine
- Optimal IdM Named a Niche Player in the Gartner Magic Quadrant for Access Management for Second Consecutive Year
- Troubleshooting Federation with Fiddler
- Preventing Disaster Through Early IAM Adoption
- Manufacturers Need Industrial-Quality Access Control
- Optimal IdM Partners with Biometric Firm TypingDNA To Extend MFA Offering
- Interview with The Last Watchdog
- Optimal IdM Earns ISO/IEC 27001:2013 Certification
- The Last Watchdog Interview: How Typing and Swiping Nuances Can Verify Your Identity
- Optimal IdM Announces FIDO Compliance with U2F Integration
- Interview: “How to Protect Your Identity in the Workplace”
- Identity And Access Management Solutions: Build vs. Buy
- Identity Management Challenges for Retailers
- HTTP Header Session Protection
- Analyzing the Niche Players: 2018 Gartner Access Management MQ Report: Solutions Review
- SystemDomain and Optimal IdM Partner to Provide Professional IAM Services
- Hotel Show-and-Tell – Massive Data Breach Exposes Identities
- Records of 114 Million U.S. Citizen & Companies Exposed Online: Brilliance Security Magazine
- New Partnership Between Omada & Optimal IdM Creates A Complete Solution For Access Management & Identity Lifecycle Administration & Governance
- Optimal IdM and Omada Partner to Create New AM and IGA Solution: Solutions Review
- Typing Biometrics and Other Multi-Factor Authentication Methods: When Passwords Are Not Enough
- Solutions Review Presents: The Top CIAM Vendors to Watch in 2019
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2019
- European Identity & Cloud Conference Ticket Giveaway
- BestCompany Article: 2019 Identity Theft and Scam Trends
- The Diversity of Multifactor Authentication Methods: Solutions Review
- Mergers, Acquisitions and Divestitures – How to Unite Your Active Directories
- Identity ‘Access’ and ‘Governance’ Tech Converge To Meet Data Protection Challenges: The Last Watchdog
- Does My Business Need Cloud Security?
- The Best Tools & Techniques for Employee Security Awareness Training
- Optimal IdM Named SIIA Business Technology Product CODiE Award Finalist for Best Identity & Access Security Solution
- Optimal IdM Receives 2019 SIIA CODiE Award For Best Identity & Access Security Solution
- Zero Trust: Organizations can begin to trust users, devices and transactions starting with a high level of IAM services and support.
- 5 Big Data Vulnerabilities You Could Be Overlooking
- Optimal IdM and Precise Technologies Partner To Address IAM Market In Middle East, Turkey and Africa
- Authentication 101: Your Basic Guide to Authentication
- The State of The Ransomware Problem
- 7 Steps to Attain a Zero Trust Security Posture
- Optimal IdM Named a Niche Player in the 2019 Gartner Magic Quadrant for Access Management
- What is a Virtual Directory Server?
- Using Context-Based Authentication and Authorization to Minimize Risk
- Behavioral Biometrics Explained
- Customer Experience Starts at Your Registration Screen
- KuppingerCole Analyst Executive View: Optimal IdM and The OptimalCloud™
- Authentication, Authorization, and API Enablement
- Snyk Releases a Kubernetes-focused Container Security Platform
- 6 Ways Blockchain Is Impacting Marketing – and How to Take Advantage of It
- 5 Ways to Create a Better Customer Experience and Increase Sales
- New Partner Platform From Optimal IdM Includes Multi-Tenant Support
- Solutions Review Names Optimal IdM an Identity Management Vendor to Watch in 2020
- Optimal IdM Named An APAC Top 10 Identity & Access Management Company
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2020
- 4 Security Authentication Updates for 2020
- Gartner Critical Capabilities for Access Management, Worldwide
- What To Know About User Authentication And Cyber Security
- Why Biometrics Will Soon Have A Big Impact on IoT Technology
- How to Protect Your Child from Identity Thieves
- 5 Ways AI is Improving Cloud Security
- Tips For Working At Home – Advice From a Virtual Business Owner
- 7 Proven Ways to Build Customer Trust
- 17 Small Business Owners Share Their Top Advice On Navigating the Coronavirus Outbreak
- Ransomware Posing as a Coronavirus App is Threatening People for Money
- Tips For Working At Home – Advice From a Virtual Business Owner
- Gartner Magic Quadrant for Access Management, Worldwide
- Pros and Cons of IDaaS
- IAM Leader’s Guide to Access Management
- What Are the Three Types of Authentication?
- Walking the Path to IAM Maturity
- New Optimal IdM Logo Testifies To Growth and Customer Service Commitment
- Circle of Trust, An Identity Federation Journey
- New Cloud Based Virtual Directory Service Released By Optimal IdM
- 6 Security Features to Look for in Your CRM Software
- TypingDNA’s biometric MFA deployed to US retail chain’s POS for login security
- Where Will the Cybersecurity Industry Be Post-Pandemic?
- The Best Secure Authentication Methods for Teams Working from Home
- Best Practices for Improving Employee Cyber Awareness
- 6 A/B Tests You Can Run on Your E-Commerce Cart
- The Forrester Wave: Customer Identity and Access Management, Q4 2020
- How to Secure Your Devices at Home and at Work
- Optimal IdM Named a Contender in 2020 CIAM Report
- 7 Ways You’ll Need to Approach Cybersecurity After COVID-19
- How To Secure Employees’ Home Networks
- IAM Managed Services Address a Human Problem
- After Bitcoin Soars, Experts Warn More Regulations Could Follow
- Types of Data Breaches
- How to Choose the Right WordPress Theme for Your E-commerce Business
- How to Prepare for Another WFH Quarter?
- Identity as the New Perimeter of Security
- Why Your Startups Should Care More About Data Security
- Gartner Buyer’s Guide for Access Management
- Small and Mid-Sized Businesses Have New Alternative For Identity Access Management Security
- 8 Ways SMBs Can Improve Cybersecurity
- Optimal IdM Named Winner of the Global InfoSec Awards during RSA Conference 2021
- The Breach That Didn’t Have to Happen
- Securing the Cloud With Biometric Data
- How Data Breaches Happen
- Top 5 Cyber Exposures Tied to the Rising Use of International Remote Workforces
- 4 IT Priorities in the WFH Era
- Authentication vs. Authorization
- The Rise of Identity Access Management in Fintech
- What is SCIM?
- Twitch Adds New Phone Verification Option to Avoid Bot Attacks
- How to Better Secure User Authentication Protocols
- The Implications of Big Tech’s Meeting With Biden
- Why You Need Identity Management Services
- Maintaining Security When Employees Work Remotely
- What Is Risk-Based Authentication?
- How to Create Your Own Online Proxy Server in Minutes
- Optimal IdM Releases Agentless B2B Desktop Single Sign-On Solution To Authenticate Vendors
- 2022 Cybersecurity Statistics
- Who Is Most Affected by Ransomware?
- 5 REMOTE TRAINING BEST PRACTICES FOR YOUR BUSINESS
- Monday.com vs ClickUp: Project management software comparison
- The Best Thing You Can Do for Your Customers That They’ll Never Notice
- Why Was Okta Hacked and How Can Companies Prevent Hacks From Occurring?
- Optimal IdM Named Winner of Two Coveted Global InfoSec Awards During RSA Conference 2022
- Top Providers To Work With – Customer Identity and Access Management
- What Is Single Sign-On?
- Okta Exposes Passwords in Clear Text for Possible Theft
- Cybersecurity Challenges in Healthcare Industry
- Get The Report – Optimal IdM Designated MFA Leader on GigaOm Radar
- Optimal IdM Designated as Leader on GigaOm Radar for Multifactor Authentication
- What Is a Brute Force Attack?
- What Is Token-Based Authentication?
- How To Detect If a Remote Job Applicant Is Legit — Or A ‘Deepfake’ Candidate
- Phishing-Resistant MFA – U.S. President Sets The Bar For Businesses
- The Complete Guide to Password Best Practices
- Optimal IdM Wins Prestigious ASTORS Award From American Security Today
- Security Question Best Practices
- The Truth About AI in Cloud Security
- The PII Problem: More Reugulations. More Data. More Pressure.
- Top Cybersecurity Threats of 2023
- HOW TO BALANCE EMPLOYEE PRIVACY AND BUSINESS SECURITY
- Understanding Data Privacy Laws: 4 Tips You Should Know
- How Companies Can Protect Customer Data
- How a Strong Identity Solution Can Protect Your Business
- Experience The Optimal Difference
- Optimal IdM Launches Licensing Management Assistant To Compliment Microsoft Azure
- What Is Encryption?
- 5 Reasons Why You Need an Identity Provider
- Salt Hashing and How It Can Lower The Chances of Exposing Login Credentials
- Everything You Need to Know About Passwordless Authentication
- 5 Best Practices for Data Warehousing
- 7 Tips for Securing Customer Data
- How Can IAM Add Value to Your Organization?
- ‘nOAuth’ Flaw in Microsoft Azure AD Does Not Affect The OptimalCloud
- ROI of Identity Access Management
- 6 Outdated Cybersecurity Practices to Avoid
- These Are the Most Spoofed Brands in Phishing in 2023
- Preparing for Transformation: AI vs. Cybersecurity – How Will AI Affect the IAM Industry?
- How Artificial Intelligence Empowers Zero Trust
- 8 Tips for Best Results in Red-Teaming
- Don’t Roll the Dice with Identity Access Management
- AI Being Used in Cyberattacks
- 4 IAM Challenges During Merger and Acquisition
- Consumer Identity vs. Enterprise Identity
- Can AI Guess Passwords?
- Future of IAM — Trends to Watch For
- Recent Breaches Put IAM In Spotlight – What Can You Do?
- 15 Ways AI and VR Can Enhance Education
- 4 Tips for Protecting Your Business From Ransomware Attacks
- Advanced Authentication: What Is It and Why Is It Important?
- 5 Benefits of Implementing Biometric Authentication in Cybersecurity
- Will Passwords Become a Thing of the Past?
- The Emerging Identity Consolidation Need – It’s All About The Applications!
- Cybersecurity Checklist for Small Businesses
- Train Your HR Teams to Identify Deepfake Job Candidates
- The Importance of Robust Security Measures in IAM Platforms
- Optimal IdM and Mammoth Cyber Announce Strategic Partnership to Deliver Secure Enterprise Access and Prevent Data Loss
- Introduction to Biometric Authentication
- Beyond Passwords: The Importance of Multi-Factor Authentication in Modern Compliance Strategies
- Automating Compliance: How IAM Streamlines Audit Processes and Reduces Manual Effort
- How Enterprise Single Sign-On (ESSO) Unlocks Efficiency In Business Operations
- The Role of Zero Trust Architecture in Next-Generation IAM