Analytics
11/21/2012
11:37 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IDaaS Provider Announces 1 Million Identities Under Management

According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014

New York, NY, November 19, 2012: Identropy, Inc., a leading Identity as a Service (IDaaS) provider, today announced that its innovative SCUID (Secure Cloud-based Unified Identity) platform is now managing more than one million users. Having secured four million dollars in Series A funding earlier this year, this significant milestone highlights Identropy's leadership position in the rapidly emerging IDaaS market. According to Gartner, Inc., in a July 2012 report titled A Guide to Making the Right Choices in the Expanding IDaaS Market, IDaaS will account for 25% of all new Identity and Access Management sales by the end of 2014.

"Identity and Access Management is critical to PPL's compliance strategy – we simply can't function without it," said Peter Johnson, Director of Information Assurance, PPL. "Identropy's SCUID platform has been instrumental in ensuring our IAM operations are always optimized without losing control of the deployment. In addition, we have saved in audit costs and in ongoing management costs."

Identropy's SCUID platform was purpose built to address the biggest barriers to successful Identity Management – technical and process complexity, governance, and Total Cost of Ownership (TCO). One key element of the SCUID platform is SCUID Operations, an offering that has been available since 2010. SCUID Operations helps organizations that have already deployed on-premise Identity Management technologies by providing cloud-based monitoring, remediation of problems, and operational metrics to ensure that customers derive maximum value and efficiency out of their existing investments. By providing this as a subscription service, Identropy has helped many customers optimize day-to-day operations of their Identity Management infrastructure in an extremely cost-effective manner.

"It is deeply gratifying that our solution has been so well received, and we have been able to help our customers transcend the business and technical challenges that have plagued IAM for so long," said Victor Barris, CEO, Identropy. "The fact that we have hit such a significant milestone in such a short period of time validates what we have known all along – that our IDaaS offerings provide a much more cost effective and efficient approach to enterprise IAM and delivers the many benefits it has to offer in a much shorter time frame."

About Identropy

Identropy is a leading Identity as a Service (IDaaS) provider, whose offerings enable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 150 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform enables organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of their IAM investments. Founded in 2006, Identropy is a privately held company. For more information visitwww.identropy.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1375
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not properly restrict access to the upload functionality, which allows remote attackers to write to arbitrary files.

CVE-2015-1376
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.

CVE-2015-1419
Published: 2015-01-28
Unspecified vulnerability in vsftp 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.

CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.