Overview of version 3.1 of the OpenIAM Identity and Access Management suite. The demo is largely focused on the end user perspective and covers Selfservice, Forgot Password, Access Review, Single Sign On and Request approval.

Happy New Year from the OpenIAM team!

We are also hiring Java developers in Phoenix, Arizona:

Research and review OpenIAM LLC jobs. Learn more about a career with OpenIAM LLC including all recent jobs, hiring trends, salaries, work environment and more.

We are hiring Java developers in Chapel Hill, North Carolina:

Job Description OpenIAM is looking for strong java developers to join its professional services team. As an IAM Solution Engineer, you will work with major clients in the US and Europe to implement the OpenIAM solution. You will extend the product with...

Managing Active Directory and Office365 through OpenIAM: #identitymanagement #activedirectory #office365

Many of our Identity Management customers have a Microsoft Environment which consists of Microsoft Active Directory and complementary components such as Microsoft Exchange, Lync, SQL server, etc. Many of these customers have, or are in the process of...

Almost half of UK business has no cyber security plan:

The survey finds that UK businesses are still shockingly unprepared for cyber attacks

We have rolled out v3.5 of our Identity and Access Management Stack:

OpenIAM Rolls Out v3.5 of the Identity and Access Governance Suite. New features provide greater flexibility, scalability and operational support.

We're hiring! OpenIAM is looking for passionate individuals to come aboard and join our team. Info at:

Digital transformation forces businesses to rethink cybersecurity:

Enterprises are increasingly bringing together security professionals with operations teams and developers.

Happy New Year from the OpenIAM team!

OpenIAM featured in CIO Review:

Specializes in identity and access management solutions in healthcare, insurance, education, telecommunications, retail, and a wide range of other...

IoT Devices as Proxies for Cybercrime:

Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digital video recorders. This post looks at how crooks are using hacked IoT devices...

Majority of enterprises admit they are vulnerable to insider threats:

Humans, whether by accident or malice, are still a reason why today's businesses are vulnerable to cyberattack.

Security: It might not be the outside world that's the largest threat to businesses:

A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

We are hard at work on v4, and will be posting previews of upcoming features on our blog:

UI Improvements for v4 Posted on September 6, 2016September 7, 2016 by suneet_shah The UI for v4 has completely overhauled. Preview the new look in this blog entry. Read More... Posted in V4 Preview Tagged ui, v4 Leave a comment

OpenIAM Self-service Password Reset Video:

Overview of the Self service password reset functionality in OpenIAM Identity Manager 3.4

Frequent password changes are the enemy of security, FTC technologist says :

Contrary to what you've been told, frequent changes can be counterproductive.