Managed Services

user icon, shield, cloud security, User Provisioning

Managed IAM Service: Identity & Access Management (IAM) Solutions

In today’s complex digital landscape, effective Identity and Access Management (IAM) is crucial for maintaining security and enabling business agility. An IAM solution helps organizations manage identities and control user access to critical resources, ensuring that the right individuals have the appropriate level of access at the right time. This article explores the benefits of […]

Managed IAM Service: Identity & Access Management (IAM) Solutions Read More »

Identity Management is More Important than CISOs Think

How important is identity management and authentication for securing Federal networks? It depends on who you ask.  If you ask me, it’s critical. The fact is, the perimeter is no longer the enterprise network firewall. Rather the identity of every person or device accessing corporate workloads and data. Ask Federal IT decision makers, and they

Identity Management is More Important than CISOs Think Read More »

UberEther’s IAM Advantage Achieves FedRAMP High Authorization: Cost and Time Savings for Government Procurement and Security Teams

STERLING, VA – OCT 26, 2023 – UberEther, a leading provider of identity and access management (IAM) solutions, announced today that its IAM Advantage solution has achieved FedRAMP High authorization. This authorization allows Government customers to quickly and securely deploy IAM Advantage in their environments, saving both time and money. “We are proud to have

UberEther’s IAM Advantage Achieves FedRAMP High Authorization: Cost and Time Savings for Government Procurement and Security Teams Read More »

The Imperative of Customer-Controlled Encryption Keys and SaaS Tenant Log Transparency: Lessons from the Microsoft Key Compromise

In the ever-evolving cybersecurity landscape, the recent Microsoft key compromise incident is a stark reminder of the importance of customer-controlled encryption keys and SaaS tenant log transparency. This incident, attributed to the Chinese threat actor Storm-0558, involved the acquisition of a private encryption key (MSA key) and its use to forge access tokens for various

The Imperative of Customer-Controlled Encryption Keys and SaaS Tenant Log Transparency: Lessons from the Microsoft Key Compromise Read More »

This Week’s White House Multifactor Authentication Symposium

When the White House hosted its symposium on modernizing authentication earlier this week, our team was pleased to participate as thought leaders contributing our thoughts on the last 20 years of HSPD12 and Identity Management in the US Federal Government. This discussion marked a significant milestone as pioneers in simple, secure, user-friendly multifactor authentication. Let’s

This Week’s White House Multifactor Authentication Symposium Read More »

UberEther’s IAM Advantage Platform Secures DoD Impact Level 5 Authorization to Operate

We are excited to announce that UberEther’s IAM (Identity and Access Management) Advantage platform has successfully achieved a Department of Defense (DoD) Impact Level 5 (IL5) Authorization to Operate (ATO). This groundbreaking achievement positions UberEther as a trusted and reliable partner to the DoD, providing secure and compliant IAM solutions that meet the rigorous security standards

UberEther’s IAM Advantage Platform Secures DoD Impact Level 5 Authorization to Operate Read More »

Accelerating Your SailPoint IdentityIQ Development with Docker

SailPoint + Docker = Speed + Consistency Over the last few years, our team has been using DevOps processes to accelerate our own development and the development of SailPoint solutions for our customers. Our processes have matured to a point that we’re able to deploy enhancements to our customer’s SailPoint implementations multiple times per day.

Accelerating Your SailPoint IdentityIQ Development with Docker Read More »

Testing Identity Governance Solutions

One of the places we have always differentiated ourselves from other teams building identity governance solutions is that we treat each project as a traditional software development project. We focus on managing the source code of the project and integrating builds into continuous integration and continuous deployment pipelines to be more agile and repeatable in

Testing Identity Governance Solutions Read More »

Oracle Exadata 1/8 Rack vs. Oracle Database Appliance ODA

We do a lot of work with the Oracle Identity and Access Management Suite and many of our customers do not have a ton of experience with the Oracle Database, nor do they want a huge Oracle infrastructure.  What they do want is high availability and reliability on the platforms underpinning their IAM solutions.  Over

Oracle Exadata 1/8 Rack vs. Oracle Database Appliance ODA Read More »