Analytics
11/21/2012
11:37 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

IDaaS Provider Announces 1 Million Identities Under Management

According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014

New York, NY, November 19, 2012: Identropy, Inc., a leading Identity as a Service (IDaaS) provider, today announced that its innovative SCUID (Secure Cloud-based Unified Identity) platform is now managing more than one million users. Having secured four million dollars in Series A funding earlier this year, this significant milestone highlights Identropy's leadership position in the rapidly emerging IDaaS market. According to Gartner, Inc., in a July 2012 report titled A Guide to Making the Right Choices in the Expanding IDaaS Market, IDaaS will account for 25% of all new Identity and Access Management sales by the end of 2014.

"Identity and Access Management is critical to PPL's compliance strategy – we simply can't function without it," said Peter Johnson, Director of Information Assurance, PPL. "Identropy's SCUID platform has been instrumental in ensuring our IAM operations are always optimized without losing control of the deployment. In addition, we have saved in audit costs and in ongoing management costs."

Identropy's SCUID platform was purpose built to address the biggest barriers to successful Identity Management – technical and process complexity, governance, and Total Cost of Ownership (TCO). One key element of the SCUID platform is SCUID Operations, an offering that has been available since 2010. SCUID Operations helps organizations that have already deployed on-premise Identity Management technologies by providing cloud-based monitoring, remediation of problems, and operational metrics to ensure that customers derive maximum value and efficiency out of their existing investments. By providing this as a subscription service, Identropy has helped many customers optimize day-to-day operations of their Identity Management infrastructure in an extremely cost-effective manner.

"It is deeply gratifying that our solution has been so well received, and we have been able to help our customers transcend the business and technical challenges that have plagued IAM for so long," said Victor Barris, CEO, Identropy. "The fact that we have hit such a significant milestone in such a short period of time validates what we have known all along – that our IDaaS offerings provide a much more cost effective and efficient approach to enterprise IAM and delivers the many benefits it has to offer in a much shorter time frame."

About Identropy

Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visitwww.identropy.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.