Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

10/19/2012
03:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ILANTUS Technologies Expands Presence In Identity Management Market

Express Initiative delivers hybrid identity and security solutions

SCHAUMBURG, Ill., Oct. 17, 2012 /PRNewswire/ -- ILANTUS Technologies, a leading system integrator and consulting organization in the identity management arena, today announced its expanded presence in the market with the Express Initiative for cloud, hosted and enterprise platforms. The Express Initiative includes products for Identity, Compliance, Federation, Connectors, and Password Management. Designed to streamline the convergence of cloud and enterprise, the Express Initiative delivers easy to use, fast to implement, and affordable hybrid identity and security solutions.

ILANTUS builds on its earlier cloud experience with the Express Initiative. In the last quarter of 2011, ILANTUS successfully introduced IdMaaS - Identity Management as a Service - to bring cloud capabilities to the identity market.

This was followed with the release of AGaaS - Access Governance as a Service - in the first half of 2012, with a pioneering implementation in the cloud for access certification. ILANTUS continues to deliver innovation and expand cloud functionality with its Express Initiative.

The Express Initiative leverages ILANTUS' industry experience and best-of-breed partnerships. By wrapping leading, proven technology engines with ILANTUS technology and developing proprietary products, the Express Initiative bridges critical gaps in the market. Express Dashboard, a business friendly portal, integrates the Express Initiative products with clients' existing IAM solutions and unifies the Initiative while delivering simplicity and ease of use.

"The identity domain is becoming more complex and challenging," said Binod Singh, President and CEO of ILANTUS. "We are committed to helping clients meet these challenges by delivering innovative, intuitive, fast to implement, and affordable solutions. Our Express Initiative exemplifies this goal by delivering products that eliminate complexity and simplify solutions."

Recognizing that the movement to cloud will ultimately be a hybrid of cloud and enterprise implementation for some time to come, ILANTUS has developed products and services that ease the transition while delivering innovative solutions for the identity and access challenges. ILANTUS enables clients to implement identity solutions in SaaS, hosted and on-premise mode while preserving their existing enterprise investments in IAM. Clients can also seamlessly manage the hybrid world of Cloud/Enterprise and easily integrate with hundreds of SaaS applications. Supporting the expanded approach to the market with Express Initiative, ILANTUS continues to deliver its hallmark fixed fee model that enables a client to address their security needs with a guaranteed solution.

About ILANTUS Technologies

ILANTUS Technologies (http://www.ilantus.com) is a leading product and solution provider in identity management, access management, access governance, and information security. ILANTUS delivers innovative identity security products and solutions rapidly and affordably in cloud, hosted and enterprise platforms, leveraging best-of-breed technologies and their 12 years of IAM software integration experience. ILANTUS is the implementation partner of choice, provides hosted/managed services and 24/7 support for companies deploying IAM software across the globe. ILANTUS responds to critical challenges in a complex market with innovative, simple, fast to implement Identity Management, Access Governance, Federation, and Password Management solutions.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...