Category: IAM

  • Centrify: Control, secure and audit access to cross-platform systems via zero trust architecture

    Centrify: Control, secure and audit access to cross-platform systems via zero trust architecture

    Centrify seeks to improve upon legacy approaches to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes a root of trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access […]

  • Trusona: Passwordless two-factor authentication

    Trusona: Passwordless two-factor authentication

    Trusona is the pioneer and leader in passwordless two-factor authentication (2FA). Stolen or weak passwords are responsible for over 80% of breaches, and Trusona’s mission is to thwart cybercrime by eliminating them from the user experience. For a good overview and really fast demo of the power of Trusona see this video: Over 200 organizations, including some […]

  • Dashlane: Manage and use passwords at work and home

    Dashlane: Manage and use passwords at work and home

    Dashlane Business is trusted by 6,000+ companies to create, enforce, and track effective access management, and features the only patented security architecture in the industry. The company has also helped over 6 million consumers manage and secure their digital identity.For insights into how this works see: The app is available on PC, Mac, Android, and […]

  • PFP Cybersecurity: Providing iron-clad identity for any device and detecting any anomalous behavior

    PFP Cybersecurity: Providing iron-clad identity for any device and detecting any anomalous behavior

    PFP Cyber does something so new and so positive it almost defies categorization. There is no Gartner magic quadrant or Forrester wave for what they do. The closest category of security solutions might be those of identity management, authentication and authorization but they are doing these things for hardware, not people. PFP can tell, by […]

  • Okta: On-Demand Identity Management for All Your Web Applications

    Okta: On-Demand Identity Management  for All Your Web Applications

    Okta is an on-demand identity and access management service that enables enterprises to accelerate the secure adoption of their web applications, both in the cloud and behind the firewall. Enterprises everywhere are rapidly adopting cloud services such as Salesforce.com, WebEx, Google Apps, Workday, or NetSuite to power their core business processes. Whether they have one […]

  • Ping Identity: Secure cloud identity management

    Ping Identity: Secure cloud identity management

    Ping Identity provides full spectrum security capabilities that enable cloud single sign on and other identity management services. Their goal is to give you an ability to know who’s who and what’s what in a modern cloud environment. From their website: Simple, proven and secure cloud identity management for employees and customers. Ping Identity meets […]

  • ForgeRock: The Open Identity Stack

    ForgeRock: The Open Identity Stack

    We have followed ForgeRock since their formation and are very excited to see their widespread acceptance. ForgeRock creates and supports identity relationship management solutions for the modern web and for enterprises. They serve cloud environments as well as traditional infrastructure. Their open source foundation makes them incredibly interoperable so they work well with legacy IT […]