Analytics
11/21/2012
11:37 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IDaaS Provider Announces 1 Million Identities Under Management

According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014

New York, NY, November 19, 2012: Identropy, Inc., a leading Identity as a Service (IDaaS) provider, today announced that its innovative SCUID (Secure Cloud-based Unified Identity) platform is now managing more than one million users. Having secured four million dollars in Series A funding earlier this year, this significant milestone highlights Identropy's leadership position in the rapidly emerging IDaaS market. According to Gartner, Inc., in a July 2012 report titled A Guide to Making the Right Choices in the Expanding IDaaS Market, IDaaS will account for 25% of all new Identity and Access Management sales by the end of 2014.

"Identity and Access Management is critical to PPL's compliance strategy – we simply can't function without it," said Peter Johnson, Director of Information Assurance, PPL. "Identropy's SCUID platform has been instrumental in ensuring our IAM operations are always optimized without losing control of the deployment. In addition, we have saved in audit costs and in ongoing management costs."

Identropy's SCUID platform was purpose built to address the biggest barriers to successful Identity Management – technical and process complexity, governance, and Total Cost of Ownership (TCO). One key element of the SCUID platform is SCUID Operations, an offering that has been available since 2010. SCUID Operations helps organizations that have already deployed on-premise Identity Management technologies by providing cloud-based monitoring, remediation of problems, and operational metrics to ensure that customers derive maximum value and efficiency out of their existing investments. By providing this as a subscription service, Identropy has helped many customers optimize day-to-day operations of their Identity Management infrastructure in an extremely cost-effective manner.

"It is deeply gratifying that our solution has been so well received, and we have been able to help our customers transcend the business and technical challenges that have plagued IAM for so long," said Victor Barris, CEO, Identropy. "The fact that we have hit such a significant milestone in such a short period of time validates what we have known all along – that our IDaaS offerings provide a much more cost effective and efficient approach to enterprise IAM and delivers the many benefits it has to offer in a much shorter time frame."

About Identropy

Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visitwww.identropy.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.