Single IDM platform for B2E, B2B, B2C and IoT

16 Jul 2017 04:24 AM By Victoria Krol - Comment(s)
To deliver digital transformation means to deliver secure digital experiences for all type of users - internal, external and non-carbon type. Because requirements for different types of users are different, enterprises need to select a solution with wide breadth of capabilities across identity and ...

Identity Management is changing

11 May 2016 11:47 AM By Nick Edwards - Comment(s)

Nick Edwards, a Senior Enterprise Architect with Identity Solutions, was recently interviewed by Polly Schneider Traylor on behalf of UnboundID on changes in Identity Management Space.

Based on this interview, Caroline Castrillon of UnboundID has posted an article below which can also be vi...

Convenience or Control? Gain both with the SailPoint IdentityIQ

09 Mar 2016 01:36 PM By Lana Belakhov - Comment(s)

Simplifying the business user experience must be balanced against ensuring that user access is managed according to corporate policies, with governance and compliance in mind. Based on a governance approach, the SailPoint IdentityIQ identity management solution provides a leading edge experience to ...

2015 - Okta Channel Partner Award Winner

01 Mar 2016 01:29 PM By Gary Bromley - Comment(s)

The 2015 Okta Channel Partner Awards winners were announced at Okta Global Annual Sales Kick Off, held 1st-4th February 2016 in San Francisco, California, US. Okta allocates awards into categories, including the "Best Okta Solution Integrator" and "Best Okta Professional Services Deli...

In a Spotlight - Bakers Delight

16 Dec 2015 12:35 PM By Lana Belakhov - Comment(s)

Bakers Delight is Australia’s fastest growing bakery franchise with 700 bakeries across Australia, New Zealand, Canada, and the U.S.A, serving two million customers each week.

The franchise organisation faced difficult consumer and competition laws which prevented them putting important systems ...

Understanding Risks from Insiders

15 Sep 2015 09:41 AM By Victoria Krol - Comment(s)
Better visibility into who has access to company's resources is key to understanding security risks.

Protect sensitive data against internal and external threats

15 Jul 2015 09:01 AM By Victoria Krol - Comment(s)
An oversight of data creation on file shares or external drives by end users exposes organisations to a challenge with understanding where data is stored, how sensitive the content is and who should have access to this data.