We are proud to announce Identity Manager 9.0. It’s a major leap forward in innovation and integration. See the below for key features that you asked for, including enhanced integration with platforms, such as Azure and SAP; as well as with One…
We are proud to announce Identity Manager 9.0. It’s a major leap forward in innovation and integration. See the below for key features that you asked for, including enhanced integration with platforms, such as Azure and SAP; as well as with One…
What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…
The Identity Governance and Administration market continues to evolve by integrating Identity Provisioning and Access Governance solutions with intelligent features. The KuppingerCole 2020 Identity Governance & Administration (IGA) Leadership Compass…
Otto Group IT serves the technology needs of companies around the world. Its clients span industries, including retail, finance and logistics. As the conglomerate undertook digital transformation initiatives, its legacy identity governance and administration…
The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…
Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex.
Target System
Description
Availab…
Starling Connect is now GA
Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of processes…
For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…
In the highly regulated investment industry, security and speed are critical.
Union Investment has been in business for more than 60 years with over 320 billion in asset and management.
Union Investment needed a flexible identity and access management…
A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples…
Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…
Digital transformation is an unstoppable force pushing nearly every organization to modify the way they operate. Seeing the competition gain an edge by embracing cloud-based resources and services is driving businesses to become more agile.
To keep up…
Fraud is a multi-faceted threat that is of growing concern for all businesses today.
Companies in the insurance industry are more at risk than most, given the fact they handle masses of highly sensitive financial data. In light of this, Natixis Assurances…
BHF-BANK achieves 40 percent faster approval times for systems access and cuts administration time on identity management by 20 hours a week.
BHF-BANK, headquartered in Frankfurt and part of the French private banking group Oddo & Cie, has been catering…
I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…
Watch Now: OnDemand Webcast
Learn IAM best practices to keep your systems compliant and secure.
Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with compliance…
I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.
…I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…
As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…
There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…
“The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.
Cloud and SaaS offerings affect businesses in the reduced…