• Solutions Review Sites
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • **NEW** Get MACHINE-MATCHED to IAM Solutions

Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services

Link to Identity and Access Management Buyers Guide

Menu

  • News
  • Best Practices
  • Best Selling Books
  • Solutions Directories
    • Identity and Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Buyer’s Guides
    • Identity & Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Vendor Map
  • Resources
  • Contact Us

Doug Atkinson

An entrepreneur and executive with a passion for enterprise technology, Doug founded Solutions Review in 2012. He has previously served as a newspaper boy, a McDonald's grill cook, a bartender, a political consultant, a web developer, the VP of Sales for e-Dialog - a digital marketing agency - and as Special Assistant to Governor William Weld of Massachusetts.
Yahoo-Goes-Passwordless-to-Access-Account-Services.jpg

Yahoo Goes Passwordless to Access Account Services

Yahoo is rolling out “on-demand” email passwords, received via phone notifications, meaning you never have to remember a fixed password ever again, …

April 6, 2015Identity Management News Read more
Identity_of_Things.jpg

The Identity of Things Could Streamline Government Services

ForgeRock VP of Strategy Daniel Raskin has an important article out at GCN, a tech site for public sector IT workers, on some of the benefits beyond security …

March 30, 2015Best Practices Read more
The-Third-Party-Threat-Are-You-Safe.png

The Third-Party Threat: Are You Safe?

Scott Braynard, VP of Public Sector for Bomgar, a remote support solutions provider that has been making inroads into the access management market, has an …

March 18, 2015Best Practices Read more
FireEye-Uncovers-Background-Monitoring-Security-Hole-in-iOS-7.jpg

Senior IT Leaders Express Concern About Identity, Access and the Internet of Things

A new survey commissioned Globalsign, the security division of the Tokyo-based GMO Internet Group, and carried out by market research firm Vanson Bourne has …

March 17, 2015Best Practices Read more
Hitachi-IDs-Best-Practices-for-Identity-and-Access-Management.png

Hitachi ID’s Best Practices for Identity and Access Management

Hitachi ID has a series of best practices out for deploying and operating your IAM solution. I think it’s worth your time to read. Here are the basics: …

March 4, 2015Best Practices Read more
NIST-Offers-Millions-for-New-Online-Identity-Management-Technology.png

NIST Offers Millions for New Online Identity Management Technology

The National Institute of Standards and Technology, or NIST, is accepting applications for its fourth round of multimillion dollar grants around its program, …

March 2, 2015Identity Management News Read more
Bitium-Presents-The-Biggest-Data-Breaches-and-Hacks-of-2014.jpg

Bitium Presents: The Biggest Data Breaches and Hacks of 2014

Bitium, a cloud-based IAM solutions provider focused on small-to-medium sized businesses, has a nifty infographic over at re/code that lists out all the major …

February 26, 2015Best Practices Read more
Microsoft-Announces-Biometric-Authentication-for-Windows-102.png

Microsoft Announces Biometric Authentication for Windows 10

Microsoft has announced that Windows 10 will feature biometric authentication. More specifically, the technology titan has joined the Fast IDentity Online …

February 24, 2015Identity Management News Read more
Gartner-Identity-Management-Critical-for-the-Internet-of-Things-IoT.jpg

Gartner: Identity Management Critical for the Internet of Things (IoT)

Gartner has gone on the record saying that managing identities will be critical for the success of the Internet of Things, or IoT, according to Pravin Prashant …

February 23, 2015Identity Management News Read more
Ponemon-Institute-Security-and-Privacy-Lapses-From-Lack-of-Enforcement.jpg

Ponemon Institute: Security and Privacy Lapses From Lack of Enforcement

A new survey says that US companies often have the right security policies and procedures down on paper, but don’t enforce them, leading to vulnerability …

February 13, 2015Best Practices Read more
← Older posts

Featured Video

IAM Solution Suggestion Engine


Download link to Identity Access Management Buyer's Guide

ManageEngine Ad
Optimal IdM Ad

Vendor Map Report Identity ManagementDownload link to Identity Access Management Vendor Map

Top Posts & Pages

  • The 10 Best Free and Open-Source Identity Management Tools
    The 10 Best Free and Open-Source Identity Management Tools
  • Best Identity Management Solutions Vendors, Companies, Software, Tools | Solutions Review
    Best Identity Management Solutions Vendors, Companies, Software, Tools | Solutions Review
  • The Best Identity and Access Management Providers for 2023
    The Best Identity and Access Management Providers for 2023
  • 6 Common MFA Mistakes Made by Enterprises
    6 Common MFA Mistakes Made by Enterprises
  • 4 Different Authentication Models (And How They Can Help)
    4 Different Authentication Models (And How They Can Help)
  • The Top 6 Password Strength Checkers and Validation Tools
    The Top 6 Password Strength Checkers and Validation Tools
  • Cyber-Attack Dwell Time: How Low Can You Go (Before It Really Helps)?
    Cyber-Attack Dwell Time: How Low Can You Go (Before It Really Helps)?

Featured Video

Download link to SIEM Buyer's Guide

Identity & Access Management Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Identity & Access Management and posts it here.

Related Solutions Review Sites

  • SIEM | Information Security
  • Endpoint Protection
  • Backup and Recovery
  • Mobile Device Management
  • twitter
  • facebook
  • linkedin
  • youtube
  • email
My Tweets

Free IAM Buyer’s Guide

Download link to Identity Access Management Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Identity and Access Management | Privacy Policy | Do Not Sell My Info
Top
 

Loading Comments...