Analytics
11/21/2012
11:37 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

IDaaS Provider Announces 1 Million Identities Under Management

According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014

New York, NY, November 19, 2012: Identropy, Inc., a leading Identity as a Service (IDaaS) provider, today announced that its innovative SCUID (Secure Cloud-based Unified Identity) platform is now managing more than one million users. Having secured four million dollars in Series A funding earlier this year, this significant milestone highlights Identropy's leadership position in the rapidly emerging IDaaS market. According to Gartner, Inc., in a July 2012 report titled A Guide to Making the Right Choices in the Expanding IDaaS Market, IDaaS will account for 25% of all new Identity and Access Management sales by the end of 2014.

"Identity and Access Management is critical to PPL's compliance strategy – we simply can't function without it," said Peter Johnson, Director of Information Assurance, PPL. "Identropy's SCUID platform has been instrumental in ensuring our IAM operations are always optimized without losing control of the deployment. In addition, we have saved in audit costs and in ongoing management costs."

Identropy's SCUID platform was purpose built to address the biggest barriers to successful Identity Management – technical and process complexity, governance, and Total Cost of Ownership (TCO). One key element of the SCUID platform is SCUID Operations, an offering that has been available since 2010. SCUID Operations helps organizations that have already deployed on-premise Identity Management technologies by providing cloud-based monitoring, remediation of problems, and operational metrics to ensure that customers derive maximum value and efficiency out of their existing investments. By providing this as a subscription service, Identropy has helped many customers optimize day-to-day operations of their Identity Management infrastructure in an extremely cost-effective manner.

"It is deeply gratifying that our solution has been so well received, and we have been able to help our customers transcend the business and technical challenges that have plagued IAM for so long," said Victor Barris, CEO, Identropy. "The fact that we have hit such a significant milestone in such a short period of time validates what we have known all along – that our IDaaS offerings provide a much more cost effective and efficient approach to enterprise IAM and delivers the many benefits it has to offer in a much shorter time frame."

About Identropy

Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visitwww.identropy.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.