Identity and Access Management News

Decentralized Identity Strategy

The Problem? Enterprises are recognizing that a centralized identity model is difficult to sustain. The number of digital identities and types of application relationships grow faster than what the enterprise can adequately respond to.   The Solution =...

read more

How to prevent the Uber hack?

    Uber invested millions of dollars in security infrastructure designed to protect customer data but In October 2016, they experienced a massive data security incident. Hackers stole personal information from 57 million user accounts including email...

read more

M&A Identity Integration & Modernization

Customer Challenge Modernize Identity management operations for a Global financial services portal supporting 800,000 customers, staff, and partners operating in 23 countries. The portal supports segmented integration with multiple identity sources including cloud,...

read more

What is the best way to integrate Okta with Azure AD?

  Leading identity and access management (IAM) solutions offer robust features to control just about every aspect of Identity Management, but the days where one IAM platform works for all situations are ending. The modern application and identity landscape is...

read more

Return On Investment

Return On Investment    Traditional Centralized Model Number of credentials = Number of Users X Number of Applications Example 10,000 Users access 15 applications =150,000 credentials x $50 user support cost =$7.5 million support cost $75,000 cost per connected...

read more

Application Integration

Application Orchestration The number of enterprise applications and SAAS services will continue to increase exponentially. The average enterprise uses 91 cloud services for marketing alone. Application growth is expanding faster than that the rate of available IT...

read more

Attribute Based Access Control (IDABAC)

Identity Attribute Based Access Control (IDABAC) Centralized directories that combine, employee, partner, and, customer data are a security nightmare. They create a perfect attack scenario by putting all your important data in one place. The IdRamp decentralized...

read more

IdRamp Key Features

Connect, manage, and measure all applications from one business friendly interface. Provide the least access required without exposing data or the network to partners. Design automatic terms, conditions and consents. Track acceptance and usage across all applications....

read more