SHARE
Facebook X Pinterest WhatsApp

Identity Automation to Focus on Identity Management Lifecycle

Top 6 Trends that Impact Your Security Posture At a time when passwords are routinely compromised, interest in other forms of authentication has never been higher. The real challenge is finding a way to manage all the forms that authentication is likely to take. With that issue in mind, Identity Automation, a provider of identity […]

Written By
MV
Mike Vizard
Sep 7, 2016
Slide Show

Top 6 Trends that Impact Your Security Posture

At a time when passwords are routinely compromised, interest in other forms of authentication has never been higher. The real challenge is finding a way to manage all the forms that authentication is likely to take.

With that issue in mind, Identity Automation, a provider of identity and access management (IAM) software, has moved to acquire 2FA, a provider of multi-factor authentication and single sign-on software.

Identity Automation CEO James Litton says the goal is to provide IT organizations with a platform capable of managing the complete identity verification lifecycle spanning everything from passwords to the nine different types of authentication many organizations already employ.

Involving everything from text messages sent via mobile phones to smart card readers, Litton says, it’s now clear to everyone that different types of assets require different levels of security. The days when IT organizations could apply a universal method to determine identity by relying on passwords alone are long over, says Litton.

“We’re going to focus on providing full lifecycle management across all forms of identity management,” says Litton.

In fact, now that the National Institute of Standards and Technology (NIST) has thrown doubt on the effectiveness of two-factor authentication, many more IT organizations will soon find themselves trying to manage more complex forms of multi-factor authentication.

It may take a while for Identity Automation to combine the assets of the two companies to create that universal identity management platform. But for IT organizations struggling with multiple forms of identity management technologies, it probably can’t come soon enough.

Save

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.