• Solutions Review Sites
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • **NEW** Get MACHINE-MATCHED to IAM Solutions

Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services

Link to Identity and Access Management Buyers Guide

Menu

  • News
  • Best Practices
  • Best Selling Books
  • Solutions Directories
    • Identity and Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Buyer’s Guides
    • Identity & Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Vendor Map
  • Resources
  • Contact Us

Jumio

oie_2221136OxN4yIBl.jpg

Identity Management and Information Security News for the Week of February 3; Radiant Logic, Guardz, Legrand, and More

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of February 3. …

February 2, 2023Featured, Identity Management News Read more
Hackers-in-Contractors-Clothing-How-Businesses-Can-Defend-Against-Scammers.jpg

Deepfakes: How Businesses Can Defend Against Scammers

As part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— …

October 19, 2022Best Practices, Featured, Staff Pick Read more
healthcare-identity.jpg

Identity Management Lessons from the UC San Diego Health Attack

We share cybersecurity-expert delivered identity management lessons from the UC San Diego Health Attack.  As we discussed in a previous article, the UC San …

July 28, 2021Best Practices, Featured Read more
MicrosoftTeams-image-22.jpg

The Biggest IAM News Items During the First Half of 2021

Our editors curated this list of the biggest IAM news items during the first half of 2021, as highlighted on Solutions Review. Cybersecurity is one of the most …

July 27, 2021Featured, Identity Management News Read more
data-breach-costs-mod.jpg

Jumio Secures $150 Million Investment For Automation, Innovation

Today, Jumio announced securing $150 million through an investment from private equity firm Great Hill Partners. The investment represents one of the largest …

March 23, 2021Featured, Identity Management News Read more
oie_zRihIir2mCx8.jpg

CRN Releases 20 Coolest Identity Access Management Companies Of 2021

Editor’s Note: Solutions Review is a vendor-agnostic publication. The thoughts and opinions of the editors of CRN are their own.  IT news and analysis …

February 25, 2021Featured, Identity Management News Read more
new-hacker-image-resize-compressed.jpg

Identity Management Experts’ Commentary on the Pixlr Data Exposure

A yet-unknown hacker yesterday exposed nearly 2 million (1.9 million) user records stolen from online photo editing application Pixlr. The stolen data, …

January 21, 2021Best Practices, Featured Read more
Firemon-Cloud-Security-modded.jpg

nTreatment Leak Exposes Thousands of Patient Files

nTreatment, a provider of electronic health and patient records to medical professionals, exposed thousands of patient records due to a failure in cloud …

December 2, 2020Best Practices, Featured Read more
new-hacker-image-resize-compressed.jpg

Identity Management Lessons from the Barnes and Noble Breach

U.S.-based bookseller Barnes and Noble confirmed a data breach that affected their e-book Nook services and potentially exposed customer data. Bleeping …

October 15, 2020Best Practices, Featured Read more
swam.jpg

What Can Businesses Learn From the Drizly Data Breach?

Drizly, a prominent online alcohol delivery startup, suffered from an attack from an external cyber-attack leading to a data breach. According to a company …

July 29, 2020Best Practices, Featured Read more
← Older posts

Featured Video

IAM Solution Suggestion Engine


Download link to Identity Access Management Buyer's Guide

ManageEngine Ad
Optimal IdM Ad

Vendor Map Report Identity ManagementDownload link to Identity Access Management Vendor Map

Top Posts & Pages

  • The 10 Best Free and Open-Source Identity Management Tools
    The 10 Best Free and Open-Source Identity Management Tools
  • Least Privilege: Reimagining Identity in The Workforce
    Least Privilege: Reimagining Identity in The Workforce
  • The Best Identity and Access Management Providers for 2023
    The Best Identity and Access Management Providers for 2023
  • Cyber-Attack Dwell Time: How Low Can You Go (Before It Really Helps)?
    Cyber-Attack Dwell Time: How Low Can You Go (Before It Really Helps)?
  • 4 Different Authentication Models (And How They Can Help)
    4 Different Authentication Models (And How They Can Help)
  • The 30 Best Identity Management Companies For 2020
    The 30 Best Identity Management Companies For 2020
  • Top 9 Authentication Books for Professionals
    Top 9 Authentication Books for Professionals

Featured Video

Download link to SIEM Buyer's Guide

Identity & Access Management Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Identity & Access Management and posts it here.

Related Solutions Review Sites

  • SIEM | Information Security
  • Endpoint Protection
  • Backup and Recovery
  • Mobile Device Management
  • twitter
  • facebook
  • linkedin
  • youtube
  • email
My Tweets

Free IAM Buyer’s Guide

Download link to Identity Access Management Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Identity and Access Management | Privacy Policy | Do Not Sell My Info
Top
 

Loading Comments...