Identity and Access Management News

Public Sector Identity Orchestration with Mike Vesey

Public Sector Identity Orchestration with Mike Vesey

Identity At The Center podcast hosts Jim McDonald and Jeff Steadman talk with Mike Vesey, CEO & President at IdRamp, about the challenges and opportunities with increasing demand for digital touchless services and how they converge with traditional physical services.

read more
Oracle Identity Cloud Orchestration with IdRamp

Oracle Identity Cloud Orchestration with IdRamp

IdRamp’s decentralized identity service allows organizations to make their OIDCS assets more portable, stronger, and easier to use. It simplifies service delivery and saves organizations time and money while preparing them for the future.

read more
Use Case: Know Your Zoom Attendee, Secure Your Zoom Event

Use Case: Know Your Zoom Attendee, Secure Your Zoom Event

Protect your Zoom meetings with a practical, easy-to-implement security tool that allows you to prevent unauthorized access. IdRamp teamed up with engineers at bak2.life, to improve Zoom security and eliminate the risk of sharing Zoom links with a new app called “Bouncer”. With Bouncer, you can scale security to any meeting size, protect paid virtual events, and add powerful new security features to your Zoom account.

read more
Hyperledger Forum Recap – Identity Proofing, and Passwordless User-friendly Digital Identity

Hyperledger Forum Recap – Identity Proofing, and Passwordless User-friendly Digital Identity

IdRamp CEO, Mike Vesey presented with Mark Rakhmilevich, Senior Director, Blockchain Product Management at Oracle. In their session, titled “Identity Proofing Solution Combining HL Indy and Fabric”, Mike and Mark presented the benefits and ease of integrating an identity proofing solution based on Hyperledger Indy, Hyperledger Fabric, while leveraging the Oracle blockchain and how using two separate distributed ledgers makes the solution stronger.

read more
Use Case: Zero Trust Webcasting – Pricewaterhousecoopers

Use Case: Zero Trust Webcasting – Pricewaterhousecoopers

Computer systems and virtual environments provide essential communication services for telework and education, in addition to conducting regular business. Cyber actors exploit vulnerabilities in these systems to steal sensitive information, target individuals and businesses performing financial transactions, and engage in extortion.

read more