Analytics
11/21/2012
11:37 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

IDaaS Provider Announces 1 Million Identities Under Management

According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014

New York, NY, November 19, 2012: Identropy, Inc., a leading Identity as a Service (IDaaS) provider, today announced that its innovative SCUID (Secure Cloud-based Unified Identity) platform is now managing more than one million users. Having secured four million dollars in Series A funding earlier this year, this significant milestone highlights Identropy's leadership position in the rapidly emerging IDaaS market. According to Gartner, Inc., in a July 2012 report titled A Guide to Making the Right Choices in the Expanding IDaaS Market, IDaaS will account for 25% of all new Identity and Access Management sales by the end of 2014.

"Identity and Access Management is critical to PPL's compliance strategy – we simply can't function without it," said Peter Johnson, Director of Information Assurance, PPL. "Identropy's SCUID platform has been instrumental in ensuring our IAM operations are always optimized without losing control of the deployment. In addition, we have saved in audit costs and in ongoing management costs."

Identropy's SCUID platform was purpose built to address the biggest barriers to successful Identity Management – technical and process complexity, governance, and Total Cost of Ownership (TCO). One key element of the SCUID platform is SCUID Operations, an offering that has been available since 2010. SCUID Operations helps organizations that have already deployed on-premise Identity Management technologies by providing cloud-based monitoring, remediation of problems, and operational metrics to ensure that customers derive maximum value and efficiency out of their existing investments. By providing this as a subscription service, Identropy has helped many customers optimize day-to-day operations of their Identity Management infrastructure in an extremely cost-effective manner.

"It is deeply gratifying that our solution has been so well received, and we have been able to help our customers transcend the business and technical challenges that have plagued IAM for so long," said Victor Barris, CEO, Identropy. "The fact that we have hit such a significant milestone in such a short period of time validates what we have known all along – that our IDaaS offerings provide a much more cost effective and efficient approach to enterprise IAM and delivers the many benefits it has to offer in a much shorter time frame."

About Identropy

Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visitwww.identropy.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web