Posts
- Optimal IdM Partners With BMC Software
- Brengs to Lead Optimal IdM Identity Management Practice
- Dickerson to Join Optimal IdM Identity Management Practice
- Optimal IdM Extends BMC© With The Release Of The Dashboard
- Optimal IdM Partners with Quest Software
- Optimal IdM Signs As Sponsor of the Directory Experts Conference
- Brengs to Speak At the Directory Experts Conference 2008
- Optimal IdM Introduces Virtual Identity Server™
- Optimal IdM’s VIS™ Provides Multi-Forest Capabilities
- Optimal IdM Releases Next Generation Of Virtual Identity Server™
- Optimal IdM Releases Next Generation of Virtual Identity Server™
- Optimal IdM Signs As Sponsor of Directory Experts Conference 2009
- Brengs to Speak At the Experts Conference in Las Vegas
- Optimal IdM’s VIS™ Receives Microsoft Server Certifications
- Optimal IdM Releases Enhanced VIS™ for Sharepoint
- Optimal IDM Releases Enhanced Virtual Identity Server™
- Optimal IDM Releases Latest Adapter for Novell eDirectory
- Optimal IDM Releases Microsoft SQL Server 2008 Adapter for VIS
- Optimal IDM Ships VIS LDAP Proxy Firewall Edition
- Optimal IDM Enhances Cloud Computing with User Provision Solution
- Optimal IDM Signs As Gold Sponsor of TEC 2010
- Optimal IDM Announces DSML Support for Its VIS
- Optimal IDM Announces Support for Sharepoint 2010
- Optimal IDM Signs on to Sponsor SPTechCon
- Optimal IDM Releases Optimal People Picker for Sharepoint 2010
- Optimal IDM Gold Sponsor of the Experts Conference 2011
- Optimal IDM Announces New Product That Integrates with ADFS 2.0
- Optimal IDM Announces Addition Of Jeffrey Bohren
- Optimal IDM Signs On As a Gold Sponsor of the Experts Conference
- Optimal IDM Announces Doubling Software Sales Revenue
- Optimal IDM Announces Virtual Identity Server for Office 365
- Optimal IDM Announces Interoperability with Microsoft Office 365
- Optimal IdM Announces the Virtual Identity Server as an API
- Optimal IDM’s Virtual Identity Server Wins Best of Tech Ed 2013
- Optimal IDM’s Virtual Identity Server Wins Best Of Tech Ed 2014
- Optimal Idm Named 100 Most Promising Microsoft Solution Provider
- Optimal IdM to Release TOTP in The OptimalCloud
- A Virtual Directory Server (VDS) Is a Swiss Army Knife That Enterprise Architects Cannot Be Without
- Webinar: What’s New, What’s Next at Optimal IdM
- Benefits of a Cloud Federation Broker
- Bridging the OAuth2/SAML2 Divide
- Cloud Federation & SSO Vendor Comparison
- Stop Data Leakage. Don’t Be the Next High-Profile Hack
- LDAP Migrations Made Easy
- That Synching Feeling I Get From Cloud SSO
- LDAP Migrations Made Easy – Part 2
- It’s So Meta (data)
- Kerberos, The Three Headed Dog of Identity
- Why You Need TOTP
- Optimal IdM’s Mike Brengs featured on ISACA
- Get Out of the Authentication Business
- More Reliability and Security for Your Enterprise
- The Way to a Hacker’s Heart: Insecure Passwords
- Why You Should Consider The OptimalCloud
- Why Customers Choose The OptimalCloud For Cloud Based SSO
- The OptimalCloud and Google Apps for Work
- The OptimalCloud Deployment Scenarios
- Data Security and the Internet of Things
- Mobile SSO
- 7 Common Security Mistakes
- The Password Problem
- Security Issues for the Semantic Web
- Demystifying Security in “The Cloud”
- Best Practices for Better UX and Security
- Why Your Business Needs an Identity Hub
- How to Evaluate Your Identity Management System
- Navigating a Multi-Forest Office 365 Migration Without Losing Your Mind
- Does IoT Have an Identity Management Problem?
- Optimal IdM Offers Stand Alone Multi-Factor Authentication-As-A-Service
- Three Reasons to Consider Cloud SSO for Apps
- Five Things CMOs Need to Know About Customer Identity and Access Management
- A Password-Free World: Past, Present or Possible Future?
- IAM Programs Should Strive for Four 9’s
- The OptimalCloud for Cloud Based Application Vendors
- Understanding Costs Differences Between IDaaS and On-Premise Deployments
- Using the Virtual Identity Server (VIS) To Migrate From One LDAP Platform To Another Platform
- 101 Uses for a Virtual Directory
- Optimal IdM Releases Authentication-As-A-Service Offering
- Optimal IdM Featured On The Best Identity Management Solutions List of 2017
- Cybersecurity Dangerously Lax at Mar-a-Lago
- Using IAM Tools To Cut The Costs of a Data Breach
- Optimal IdM Positioned in the Niche Players Quadrant of the Gartner Magic Quadrant for Access Management
- Cloud Provisioning – The Good, Bad, and the Ugly
- Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity as a Service: Single Sign-On to the Cloud Report
- Optimal IdM Names Chris Curcio as Vice President, Channel Sales Division
- Using MFA for Server Access Thanks to the Optimal GINA™ Plugin
- Why Identity and Access Management Is So Important for Data Security
- Enterprise Identity Management Tools Keep Cloud Hackers at Bay
- Podcast on ITSP Radio
- Optimal IdM Appoints Industry Veteran Mark Foust as Director of Worldwide Sales
- Top 5 Road-Blocks Migrating To A Cloud Identity and SSO Solution
- Cybersecurity Threats Your Employees Should Know About
- Buyer’s Guide to Multi-Factor Authentication (MFA)
- Optimal IdM Honored with CyberSecurity Breakthrough Award
- Do You Know Who You’re Letting Inside Your Networks?
- Protecting Critical Infrastructure from Cyber Threats
- Four Simple Steps to Online Safety
- PODCAST: How Identity Access Management (IAM) Authenticates Network Connections
- Hybrid Cloud Security Challenges Remain Tough To Overcome
- Initiating Steps On The Path To GDPR Compliance
- Optimal IdM Now OpenID Connect Certified
- Top 10 Reasons for the Virtual Identity Server (VIS)
- How I Became a Senior Software Architect
- ‘Extending The Mine’: Inside Day 2 Of The Cyber Security Exchange
- Optimal IdM Chief Software Engineer Jeff Bohren to Present at InfoSec World 2018
- GDPR Compliance – Assessing Data Controls and Risk Management
- Keeper Security Patches Password Protection Flaw Reported by Google
- Why Do Data Breaches Happen?
- Internal Hiring vs. Hiring a MSSP: Which Is Better?
- Optimal IdM Honored with Homeland Security Award from Government Security News
- IAM Addresses Help Desk Issues
- Enterprise CIO
- GDPR and Governance
- Boost Your Cyber Maturity Level with IAM
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2018
- Old Logins are White Hot on the Dark Market: American Security Today
- Optimal IdM Chief Revenue Officer Mike Brengs to Preside on Panel at the 2018 KNOW Identity Conference
- SharePoint for Government – Is Seamless AND Secure Authentication Possible?
- Optimal IdM Announces Customer Support for GDPR
- Integrate Your Mobile Applications Into Your Company
- The Fundamentals of Blockchain
- State Insecurity: Why Are Top NSA Personnel Leaving in Droves
- Optimal IdM Awarded USF Fast 56
- The Barriers to Entry for Blockchain
- RealMe Integration Services from Optimal IdM
- 8 Hot Cyber Security Trends (and 4 Going Cold): CSO Online
- Identity Blockchain: Identity Trust Fabric
- Privileged Access Management 101
- Password Security – MFA and Agentless SSO Explained: Cyber Defense Magazine
- Finding the Right Consumer IAM Products
- When to Synchronize, Virtualize and Federate Data in the Enterprise
- Agentless SSO – What’s The Big Deal?
- Podcast: The Charles Tendell Show
- Know Your Credentials: The Other KYC Requirement
- Healthcare Industry Selects Optimal IdM as Top 10 Authorization and Authentication Solution
- How Privacy Is Moving Data Security To The Top Of Corporate Agendas: CSO and IT News
- Video Interview: Terri Robinson, Executive Editor of SC Media, speaks with Optimal IdM
- Protecting Your Patient’s PHI Data
- Should U.S. Companies Be GDPR Compliant? Yes!
- Protecting Your Patient’s PHI Data (Part 2 of 2)
- Podcast: Mark Foust Inteview with John Dasher, Editor ITSPmagazine
- Optimal IdM Named a Niche Player in the Gartner Magic Quadrant for Access Management for Second Consecutive Year
- Troubleshooting Federation with Fiddler
- Preventing Disaster Through Early IAM Adoption
- Manufacturers Need Industrial-Quality Access Control
- Optimal IdM Partners with Biometric Firm TypingDNA To Extend MFA Offering
- Interview with The Last Watchdog
- Optimal IdM Earns ISO/IEC 27001:2013 Certification
- The Last Watchdog Interview: How Typing and Swiping Nuances Can Verify Your Identity
- Optimal IdM Announces FIDO Compliance with U2F Integration
- Interview: “How to Protect Your Identity in the Workplace”
- Identity And Access Management Solutions: Build vs. Buy
- Identity Management Challenges for Retailers
- HTTP Header Session Protection
- Analyzing the Niche Players: 2018 Gartner Access Management MQ Report: Solutions Review
- SystemDomain and Optimal IdM Partner to Provide Professional IAM Services
- Hotel Show-and-Tell – Massive Data Breach Exposes Identities
- Records of 114 Million U.S. Citizen & Companies Exposed Online: Brilliance Security Magazine
- New Partnership Between Omada & Optimal IdM Creates A Complete Solution For Access Management & Identity Lifecycle Administration & Governance
- Optimal IdM and Omada Partner to Create New AM and IGA Solution: Solutions Review
- Typing Biometrics and Other Multi-Factor Authentication Methods: When Passwords Are Not Enough
- Solutions Review Presents: The Top CIAM Vendors to Watch in 2019
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2019
- European Identity & Cloud Conference Ticket Giveaway
- BestCompany Article: 2019 Identity Theft and Scam Trends
- The Diversity of Multifactor Authentication Methods: Solutions Review
- Mergers, Acquisitions and Divestitures – How to Unite Your Active Directories
- Identity ‘Access’ and ‘Governance’ Tech Converge To Meet Data Protection Challenges: The Last Watchdog
- Does My Business Need Cloud Security?
- The Best Tools & Techniques for Employee Security Awareness Training
- Optimal IdM Named SIIA Business Technology Product CODiE Award Finalist for Best Identity & Access Security Solution
- Optimal IdM Receives 2019 SIIA CODiE Award For Best Identity & Access Security Solution
- Zero Trust: Organizations can begin to trust users, devices and transactions starting with a high level of IAM services and support.
- 5 Big Data Vulnerabilities You Could Be Overlooking
- Optimal IdM and Precise Technologies Partner To Address IAM Market In Middle East, Turkey and Africa
- Authentication 101: Your Basic Guide to Authentication
- The State of The Ransomware Problem
- 7 Steps to Attain a Zero Trust Security Posture
- Optimal IdM Named a Niche Player in the 2019 Gartner Magic Quadrant for Access Management
- What is a Virtual Directory Server?
- Using Context-Based Authentication and Authorization to Minimize Risk
- Behavioral Biometrics Explained
- Customer Experience Starts at Your Registration Screen
- KuppingerCole Analyst Executive View: Optimal IdM and The OptimalCloud™
- Authentication, Authorization, and API Enablement
- Snyk Releases a Kubernetes-focused Container Security Platform
- 6 Ways Blockchain Is Impacting Marketing – and How to Take Advantage of It
- 5 Ways to Create a Better Customer Experience and Increase Sales
- New Partner Platform From Optimal IdM Includes Multi-Tenant Support
- Solutions Review Names Optimal IdM an Identity Management Vendor to Watch in 2020
- Optimal IdM Named An APAC Top 10 Identity & Access Management Company
- Optimal IdM Featured On PCMag Best Identity Management Solutions List of 2020
- 4 Security Authentication Updates for 2020
- Gartner Critical Capabilities for Access Management, Worldwide
- What To Know About User Authentication And Cyber Security
- Why Biometrics Will Soon Have A Big Impact on IoT Technology
- How to Protect Your Child from Identity Thieves
- 5 Ways AI is Improving Cloud Security
- Tips For Working At Home – Advice From a Virtual Business Owner
- 7 Proven Ways to Build Customer Trust
- 17 Small Business Owners Share Their Top Advice On Navigating the Coronavirus Outbreak
- Ransomware Posing as a Coronavirus App is Threatening People for Money
- Tips For Working At Home – Advice From a Virtual Business Owner
- Gartner Magic Quadrant for Access Management, Worldwide
- Pros and Cons of Using an IDaaS Solution
- IAM Leader’s Guide to Access Management
- Types of Authentication Methods
- Walking the Path to IAM Maturity
- New Optimal IdM Logo Testifies To Growth and Customer Service Commitment
- Circle of Trust, An Identity Federation Journey
- New Cloud Based Virtual Directory Service Released By Optimal IdM
- 6 Security Features to Look for in Your CRM Software
- TypingDNA’s biometric MFA deployed to US retail chain’s POS for login security
- Where Will the Cybersecurity Industry Be Post-Pandemic?
- The Best Secure Authentication Methods for Teams Working from Home
- Best Practices for Improving Employee Cyber Awareness
- 6 A/B Tests You Can Run on Your E-Commerce Cart
- The Forrester Wave: Customer Identity and Access Management, Q4 2020
- How to Secure Your Devices at Home and at Work
- Optimal IdM Named a Contender in 2020 CIAM Report
- 7 Ways You’ll Need to Approach Cybersecurity After COVID-19
- How To Secure Employees’ Home Networks
- IAM Managed Services Address a Human Problem
- After Bitcoin Soars, Experts Warn More Regulations Could Follow
- Types of Data Breaches
- How to Choose the Right WordPress Theme for Your E-commerce Business
- How to Prepare for Another WFH Quarter?
- Identity as the New Perimeter of Security