HID Now Supports Seos-Enabled Student IDs in Apple Wallet

HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users...

Micro Focus Aims to Simplify Windows and Linux IAM With Its New Offering, AD Bridge

Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...

Vivvo Delivers E-Services Platform CitizenOne

Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.

SAP Facilitates Better Customer Experiences by Adding B2B Functionality to CIAM Solutions

SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.

Be More Secure Without Passwords: Microsoft Embraces Passwordless Authentication and FIDO2

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using...

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us