Category: IAM

Identity and Access Management and Authorization.

PFP Cybersecurity: Providing iron-clad identity for any device and detecting any anomalous behavior

PFP Cyber does something so new and so positive it almost defies categorization. There is no Gartner magic quadrant or Forrester wave for what they do. The closest category of security solutions might be those of identity management, authentication and authorization but they are doing these things for hardware, not people. PFP can tell, by measuring details of power consumption, what a device is and if it is behaving normally. It can use this capability to identify counterfeit hardware. It can also identify when malicious code has been installed on devices because of changes to the power signature of the device. 

For an overview of how they do it, see:

The result: PFP cyber provides a device security platform solving some of the biggest challenges in security today. Solutions are proven to work for IoT, data center servers, PCs, routers, ICS and SCADA devices. Solutions can be used for operational systems and for also confirming products before they are brought into the enterprise. For example, see the brief demo below showing a supply chain assurance solution:

For more see: https://pfpcyber.com/

Dashlane: Manage and use passwords at work and home

Dashlane Business is trusted by 6,000+ companies to create, enforce, and track effective access management, and features the only patented security architecture in the industry. The company has also helped over 6 million consumers manage and secure their digital identity.

For insights into how this works see:

The app is available on PC, Mac, Android, and iOS, and has won critical acclaim from top publications, including: The New York Times, The Wall Street Journal, and USA Today. The company has received $52.5 million in funding from TransUnion, Rho Ventures, FirstMark Capital, and Bessemer Venture Partners.

We track Dashlane in the CTOvision Disruptive IT Finder in our Cybersecurity Companies Section.

For more see: Dashlane.com

ForgeRock: The Open Identity Stack

We have followed ForgeRock since their formation and are very excited to see their widespread acceptance.

ForgeRock creates and supports identity relationship management solutions for the modern web and for enterprises. They serve cloud environments as well as traditional infrastructure. Their open source foundation makes them incredibly interoperable so they work well with legacy IT as well as the most modern applications.

For a brief introduction to ForgeRock and IRM see the video by CTO Lasse Andresen at this link and embedded below:

OK that was incredibly brief. For more see this video by Forgerock VP of Community Management Allan Foster:

Since the ForgeRock approach is based on open source it is incredibly easy for program managers to start with their software (download it free). It is also easy to test, evaluate, and scrutinize every line of code should you be so inclined. For enterprises with mature security programs this is a must have feature in identity management solutions.

For more see: http://ForgeRock.com

 

Ping Identity: Secure cloud identity management

Ping Identity provides full spectrum security capabilities that enable cloud single sign on and other identity management services.

Their goal is to give you an ability to know who's who and what's what in a modern cloud environment.

From their website:

Simple, proven and secure cloud identity management for employees and customers. Ping Identity meets identity challenges across the enterprise, improving collaboration and customer engagement.

For more see: http://pingidentity.com

Okta: On-Demand Identity Management for All Your Web Applications

Okta is an on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web applications, both in the cloud and behind the firewall.

Enterprises everywhere are rapidly adopting cloud services such as Salesforce.com, WebEx, Google Apps, Workday, or NetSuite to power their core business processes. Whether they have one cloud application, or are managing across many, they need a solution to help them adopt, deploy, secure and manage these services.

That solution should itself be built from the ground up as a highly reliable, scalable, secure, on-demand service. Okta is that service.

100% on-demand, Okta delivers a complete, turnkey solution that addresses the needs not only of IT, but also end-users, and business executives – no customization work or long services engagements required.

Learn more here: http://www.okta.com/