Tom Macartney has been putting together an identity feeder process for IBM Verify using Node-Red - the "low-code programming platform for event-driven applications". This demonstration uses our own Partner Identity solution, UMT, as an identity source and showcases how you can build an identity feeder in minutes. #ibm #nodered #madiganumt #lowcode #ibmverify
Madigan Solutions
IT Services and IT Consulting
Madigan Solutions: Specialists in Identity Governance & Access Management
About us
Madigan Solution is a specialist in providing consultancy, delivery and managed services for Identity Governance & Access Management solutions.
- Website
-
https://www.madigansolutions.com/
External link for Madigan Solutions
- Industry
- IT Services and IT Consulting
- Company size
- 2-10 employees
- Headquarters
- Belfast
- Type
- Privately Held
- Founded
- 2021
- Specialties
- Identity Management, Access Management, Privileged Access Management, Zero Trust, Multi-Factor Authentication, and Identity Governance
Locations
-
Primary
Arnott House, 12-16 Bridge Street
Belfast, BT1 1LU, GB
Employees at Madigan Solutions
Updates
-
This video is a recap of a demonstration that was given by Stephen Swann at an IBM Identity Fabric Roadshow event at IBM Denmark HQ in Copenhagen on 28 November 2024. It shows how IBM Verify can orchestrate user registration journeys in conjunction with our own UMT solution and ID Dataweb's identity proofing solution. The use case is a little contrived, but it should show how simple it is to define a user journey using the Flow Designer tool in IBM Verify. Thanks to the team in Copenhagen for indulging us in running the demo - Morten Wibe, Morten Jean, Oliver Hillersborg, Peter Ellegaard, Liv Stubbe Teglbjærg. #ibmtechxchange #identityfabric #ibmchampion #ibmsecurity #ibmverify
-
As the digital landscape evolves, so too does the complexity of cyber threats. In response, the field of cybersecurity is increasingly turning to artificial intelligence (AI) to bolster defence mechanisms against sophisticated cyberattacks.
The Increasing Role of Artificial Intelligence in Cybersecurity
madigansolutions.com
-
In the realm of cybersecurity, one of the most significant vulnerabilities is our own human actions, often serving as the lynchpin in the success of cyberattacks.
The Crucial Role of the Human Element in Cybersecurity Breaches
madigansolutions.com
-
Your identity governance platform should allow you to automate your user onboarding, provisioning, and life-cycling but this is not enough. You need also to prove how effective those processes are and how that effectiveness can be compared against...
IAM Sprint: Identity Analytics
madigansolutions.com
-
One of the most effective strategies for fortifying your organisation's security posture is through Privileged Access Management (PAM).
Enhancing Security with Privileged Access Management (PAM)
madigansolutions.com
-
In the ever-evolving landscape of cybersecurity, Denial of Service (DoS) attacks continue to pose a significant threat to organisations worldwide.
The Increasing Threat of Denial of Service (DoS) Attacks
madigansolutions.com
-
As organisations worldwide face an escalating number of cybersecurity threats, securing access to digital resources has never been more crucial - particularly in identity and access management (IAM).
The Importance of Multi-Factor Authentication (MFA)
madigansolutions.com
-
What end users really want is frictionless access to the platforms and systems they need to access to fulfil the requirements of their job. No blockers. No painful processes.
IAM Sprint: Access Requests That Work
madigansolutions.com