The Optimal Brief | September 2020
Biometric MFA Deployed to US Retail Chain’s POS for Login Security
“With the implementation of TypingDNA’s behavioral biometrics solution, our users benefit from two-factor authentication while they type in their email and password to sign in,” Phil Beaudoin, Head of Enterprise Technology and Support Services said in a prepared statement. “Optimal IdM has been a great partner helping us integrate TypingDNA’s product so we can benefit from a higher degree of security while maintaining a great user experience!”
Where Will the Cybersecurity Industry Be Post-Pandemic?
Many people have weighed in about the new cyberthreats emerging due to the COVID-19 pandemic. They have useful insights, but it’s also valuable to take a forward-thinking approach and ponder what the cybersecurity industry will look like once this health crisis is finally over. Cybersecurity Insiders tapped Optimal IdM for our input.
Six Security Features to Look for in Your CRM Software
For a CRM solution to be truly useful, you must have effective CRM security features installed. Otherwise, anyone looking at your CRM can access all your business practices and employee information. The very thing that makes this technology useful could destroy your business if a hacker has the right motive. To dissuade cyber threats, you must ensure the CRM program you choose is the best choice for you. Devin Partida, Editor-in-Chief of ReHack.com, utilized expert advice from Optimal IdM for this recent blog,
The Best Secure Authentication Methods for Teams Working from Home
For a CRM solution to be truly useful, you must have effective CRM security features installed. Otherwise, anyone looking at your CRM can access all your business practices and employee information. The very thing that makes this technology useful could destroy your business if a hacker has the right motive. To dissuade cyber threats, you must ensure the CRM program you choose is the best choice for you. Devin Partida, Editor-in-Chief of ReHack.com, utilized expert advice from Optimal IdM for this recent blog,
Quick Poll
With conferences canceled, how likely are you to attend a virtual tradeshow?
Very Likely
Somewhat Likely
Not Likely
Never
Poll Results From Last Month

New Webinar:
CIAM vs. IAM -
Passwordless Authentication and Other Best Practices

Oct 28, 2020 12:00 PM EST
In this presentation we will use real-world examples to show how to create a solid CIAM strategy, and discuss the following topics.

• Frictionless registration that keep customers engaged
• Universal directory services for a single view across directories
• Scalability to take on thousands or millions of users at a time
• Managed services to secure data and increase your security posture
• Why a complete platform is more beneficial than multiple products joined together
• User data transparency and data privacy compliance

Speakers include:
Andras Cser, Vice President and Principal Analyst - Security and Risk Management
Forrester Research, Inc.
Mike Brengs, CRO and Managing Partner
Optimal IdM
Resource Center
Why You Need
Cloud Hosted
Virtual Directory
Services
This presentation will discuss the benefits of cloud hosted virtual directory services and provide use cases of how the Optimal IdM team deploys, hosts, manages & monitors their signature virtual directory product, the Virtual Identity Server, in a cloud environment.
The Future of Authentication: Behavioral Biometrics, Tokenless MFA & Adaptive Authentication
Frictionless authentication by the way you type? Yes it's true. This presentation discusses how this and other Multi-factor Authentication solutions are changing the login landscape.
Walking The
Path To
IAM
Maturity
To reach IAM maturity, businesses need a roadmap – an understanding of where they’re going and a knowledge of the milestones they should be meeting along the way.
3959 Van Dyke Rd, Lutz
Florida 33558, US
1-813-425-6351