All Posts By

Nitaant Singh

ILANTUS Compact Identity Scores Big with First Customers

By | IAM | No Comments

Identity and Access Management vendor ILANTUS Technologies launched its revolutionary new product ‘Compact Identity’ on August 18, 2018. Promising a powerful yet simple all-inclusive IAM solution with both Access Management (Single Sign-On + Password Management) and basic IGA features, the customers came quick.

Fast forward, and the feedback from the first few customers has been nothing short of tremendously positive. The consensus has been that the product meets and exceeds expectations.
The global market has received the product with praise. Observing that Compact Identity is the first product that follows customer processes (instead of creating a process that a customer must follow), the word is that Compact Identity is perhaps the definitive answer to organizations with simple IAM needs.

The following elements in the solution have received positive response from customers:
1) Role-based Access Control (RBAC) – This feature is reportedly intuitive and easy to use compared to other products. “Excellent” was the feedback.
2) Patented Thick-client SSO – Compact Identity utilizes ILANTUS’ patented SSO technology for thick-client apps. Complex apps like SAP, Putty and Skype are handled with ease. Customers reported that they experienced a more streamlined SSO environment where “no apps were left out of the SSO scope”. This contrasts with the common experience of thick-client apps being left to their own authentication mechanisms.
3) Context Based Authentication – The solution sports location, device and time-based contextual authentication. For a product of this scope and at its highly competitive price-point, this feature created delight.
4) Access Governance – With an implementation time of under 4 weeks, Compact Identity is being regarded as the most quick and easy way to get basic Access Governance working.

Apart from thick-client SSO, these features are available in other products. But what ILANTUS customers have found to be of value is the synergistic and streamlined way all IAM elements are masterly fused together in Compact Identity. Nothing is out of place, too complex or left mostly unused. In fact, one customer reported an ROI of only 3 days. Feature usage from customer surveys appears to defy the 80-20 rule as the percentage of commonly used features is over 70%.

Finally, the market has been murmuring its appreciation for the competitive price of the product. Folk have started raising eyebrows at the industry as most products have poor ROI but high prices. In contrast, ILANTUS is slowly being seen as an organization that offers quality along with integrity. This is largely due to their business philosophy. ILANTUS CEO Binod Singh says that the domain is not natural in that its existence is largely a response to cybercrime. He asserts that IAM vendors have a duty to protect customers at all costs and not to try to maximize profits like a luxury car business.

ILANTUS’ product philosophy is not a generic one either. Their motto is ‘round pegs for round holes’ and that ‘one-size does NOT fit all’ – they believe in creating products that serve different customer segments precisely in the manner that best meets their needs. Compact Identity was created for organizations with IAM needs that are not extremely complex – such as SMBs and Educational Institutions.

Compact Identity has already been a boon for many of its initial customers. It is proof that ILANTUS stands by its vision and product philosophy, and that the company puts the money where the mouth is. In an industry where long implementation times, incomplete implementations and poor ROI are the de facto standard, this company might be paving a way for a new future.

Request a Demo

Press Releases

Business Today
New Delhi Times

Single Sign-On – An Overview

By | IAM | No Comments

Single Sign-On(SSO) is a technology in the domain of Identity and Access Management (IAM). It allows users to log in to multiple applications with a single password (even if the actual password for each app is different).

SSO offers enormous productivity, cost, security and user experience benefits. It enhances security by reducing jotted-down passwords due to password fatigue (confusion resulting from having too many passwords for different apps). It enhances productivity by making access to apps quick and streamlined (thus cutting idle time related costs). User experience is improved in the process.

SSO solutions typically use Security Assertion Markup Language (SAML) to simplify the login process. SAML takes advantage of concepts in cryptography to distribute tokens from an Identity Provider (IdP) to different applications, granting application access in a manner that does not involve passwords.

With ILANTUS SSO you can access all your apps whether they are federated, non-federated or thick-client with a single password. This saves considerable time in getting employees productive every day – and time is money.

Our SSO sports a few unique features that you would be hard pressed to find in competing products.

Thick-client apps (desktop apps), for example, while are being relied upon less and less in favor of web apps, are still an industry standard and some industries such as banking rely very heavily upon them. For example, ERPs such as SAP are a staple in most organizations. Other IAM solutions do not possess the technology to include these apps in the SSO network (and if they do, they accomplish this in a roundabout way where breakdowns and implementation times are high). ILANTUS boasts patented technology ( that guarantees stable and pain-free SSO to all thick-client apps. We can even enable you to SSO to many shop floor machines and various devices!

Nested Multi-tenanting is a feature in our Compact Identity solution (which is engineered from the ground up to cater to organizations with simple IAM needs). This feature allows multiple Active Directory Server Domains to be configured within the same tenant instance of the solution. It enables Administrators to configure features required for different domains to those specific domains. This feature offers very high ROI as other solutions require additional instances to accomplish this.

It is no secret that certain apps work best with specific browsers. ILANTUS solutions solve this problem with our exclusive browser preference feature. Choose which browser you want an app to open with and it will open with that one every time for a pain free experience!

In addition, here are some features of ILANTUS SSO:

  • Integrated Windows Authentication (IWA) – get automatically logged in to all your apps when you login to Windows.
  • SSO to SAML apps – Compact Identity and Niche Identity can SSO to all SAML apps.
  • SSO to non-federated apps – Not SAML based? No problem! Our solutions can SSO to these apps too!
  • Password Sync – Update of your AD password syncs the same password with all apps so that you only have one password for all apps.
  • Auto-launch – Automatically launch selected apps when you login to your Windows account (signed-on to and ready to go!)
  • Enterprise Portal Integration – If your organization has a centralized portal for employees, our SSO can integrate with this.

ILANTUS has over 18 years of experience in the domain. We have seen the landscape develop and have learned through our customers what works and what doesn’t. We know what is needed in an SSO solution for customer delight. Check out our SSO solutions today!


Simple SSO             Enterprise SSO

Business Benefits of Compact Identity

By | IAM | No Comments

Some products are necessities – pretty much no business today could manage without Microsoft Office 365. Other things like hiring a video production company to do your corporate videos are conveniences (you can produce these yourself if you don’t want to spend much). Identity and Access Management is both a necessity and convenience. It is quickly becoming a necessity due to the competitive edge it offers, and the effects that it has on an organization are highly convenient!

Identity and Access Management comprises of 4 interrelated but independent modules. Single Sign-On (SSO) is allows employees to sign in just once with a single password to access all the apps that they use regularly. Password Management handles password changes and resets. User Lifecycle Management (ULM) provides necessary accesses when an employee joins an organization (called birthright provisioning) and at every role change, promotion or transfer in his journey. Access Governance (AG) seeks to address critical questions such as ‘who has access to what’, create a system for orphan account management, etc.

ILANTUS Compact Identity is a powerful but compressed (and lightweight) all-in-one solution that addresses all these areas. Built for organizations with simple needs, it is also the first solution in the world to utilize our patented thick-client SSO technology.

The following matrix shows the benefits of Compact Identity in brief:

Single Sign-On:
Experience enormous time and money savings (and user delight!) from signing-on only once to access all your apps. The solution ensures that employees automatically comply with company policies that state ‘no passwords written down on paper or saved to documents on laptops/mobile devices.’ The multifactor authentication in Compact Identity’s SSO ensures that authentication is near foolproof. And since just one password is required for all apps, an organization can set a stronger password policy without worrying about employees forgetting. All this elevates user experience.Let’s look at each benefit of the different modules in Compact Identity.

Password Management: Self-service Password Reset in Compact Identity eliminates the need for a human-powered helpdesk. This automation saves money, and employees also experience much lower lockout times. They can just use the system to reset their passwords for themselves. Travelling employees and/or those in different time-zones are also empowered to be productive at all times. Owing to this ease in resetting passwords, an organization using this solution can also enforce stronger

password policies. Authentication systems can also be implemented for password resets or changes. All this also improves user experience.

User Lifecycle Management: Without ULM it can take up a to a week for an organization to onboard a new user (induct her or him in the enterprise directory, create credentials and provision all necessary accesses). Our solution enables organizations to do all this within 10 minutes. It also features access requests and approval so that employees who need to access apps that are not defined for their role can quickly continue to be productive. Compact Identity’s ULM module allows organizations to enforce role-based access control and to comply with security and access policies.

Access Governance: Orphan accounts are those whose user has left the organization, but all its accesses are still intact. These are critical security threats as there is nobody to report a breach if the credentials become compromised. With our AG module, orphan account management becomes a easy – they are detected in real-time and deleted immediately. ‘Who has access to what’ reports are supremely important the internal security of an organization. As much as outside entities can compromise sensitive data, maniac employees can potentially wreak even greater havoc if they have access to apps and systems that they ought not to. With Compact Identity’s Access Governance module, Access Reviews and recertifications is easy.

Compact Identity is agile but powerful. It is user friendly yet has the necessary depth and complexity needed for an effective IAM solution. It has huge ROI (one customer reported an ROI of only 3 days!) and is competitively priced. It also has various features that exist nowhere else in the industry such as patented thick-client single sign-on technology. The solution is perfect for organizations that require simplified Access Governance and User Lifecycle Management such as SMBs and educational institutions. Learn more about Compact Identity here

Request a Demo

Identity and Access Management in Emerging Economies

By | IAM | No Comments


Our experience has shown us that the awareness and adoption of Identity and Access Management solutions is much lower in developing countries than in developed countries like the USA. Why is this so and what can be done about it?

There are various reasons for this phenomenon.

  • Developing countries, by definition, either engage primarily in agricultural business or are in the process of industrialization. This means that majority of the work force is engaged either on farms and mills or in production factories. When most of the businesses in a country have 95% of their staff as laborers, the need for IT systems is limited, and Identity and Access Management seems irrelevant.
  • Business in developing countries tend to function in a hand-to-mouth manner and operate without much of a plan and in a disorganized way. In other words, they are not very process oriented. Identity and Access Management systems are highly process oriented and trade brute force and human labor for intelligence and automation. Businesses in developing countries are at odds with such a mindset and as such do not think about IAM.
  • While breaches occur in every country, they make the headline far more often in developed ones. This has created a skewed perception that businesses in developing countries are not at risk.
  • Lack of skilled labor is another issue in developing countries. Skilled IT professionals that understand the importance of IAM and that can oversee the implementation and handle the day-to-day operations of an IAM system are limited.
  • The cost savings that accrue from IAM in developing economies is smaller. The elimination of IT helpdesk costs that developed nations can enjoy by employing an IAM solution is not as much in emerging economies.
  • There is a general lack of awareness as these countries do not have thriving economies and the focus of businesses is on survival and not on things like security.
  • Developing economies are typically high-growth economies. Basic IT infrastructure development to support the growth is the center of attention and not cybersecurity.



Nothing can be done about nations that still haven’t developed to a stage where IT has become an essential. Countries that are still primarily agricultural simply need more time to mature.

Still, there are the ‘in-between’ nations that are still developing but have successfully started to industrialize. India and Brazil, for example, can benefit from IT and Identity and Access Management but are not yet perfect markets for it.

Here’s what can be done:

  • Start by offering solutions that require low IT skills and are largely automated. This takes the guesswork out of what is needed by the organization for its size. Offer all-in-one IAM suites that are powerful yet simple and cover all needs of companies with up to 10,000 users (as developing countries usually have a larger number of businesses with fewer employees.) Focus on Access Management (SSO and Password Management) which boosts productivity and security. Access Governance, while equally necessary, is not likely to be a priority to these companies. Try and introduce it after the benefits of Access Management are experienced.
  • Highlight benefits rather than features. The availability of a central user repository instead of fragmented user stores and improved user experience due to SSO and Password management are key areas that can be highlighted.
  • Emphasize the cloud model which removes complex installations, updates and upgrades. This makes the annual outlay small.
  • Sell by adding to infrastructure services through IT service providers.
  • Target industries that have higher cost benefits from an IAM solution – such as BPOs.
  • Look for niches and unconventional but common industry environments such as SSO to HPLC machines in the pharmaceutical industry.


ILANTUS Compact Identity is a prime IAM product for developing nations. It has a low cost, low implementation time, and does not require extensive IT skill or many IT savvy employees. It is powerful and compares (even surpasses) with any IAM suite on the market now. Since developing countries comprise largely of factories, our patented (and unique in the industry) SSO to thick-client apps is a boon for organizations in these countries. With this feature, shop floor machines, pharmaceutical production devices etc. can be included in the Single Sign-On system.

Developing nations require time and education to become mature markets for Identity and Access Management. Educational programs and – particularly – providing the right kind of solutions that require low IT skills and few IT personnel – are key to getting such countries to adopt IAM.

The Five Factors of Authentication

By | IAM | No Comments

Pretty much everyone today knows what a password is and has a password(s) for something or the other. We have relied on passwords to protect us for a long time. But passwords are not as hard to crack as one might think – and even easier given the state of hacking technology.

Jim Carrey as Ace Ventura Cracks a Password in Seconds

The time in which a password was a barrier between something valuable to you and someone who shouldn’t have access to it is at an end. Or, at least, the time in which passwords were the only barrier are…

Technology has evolved both for professional hackers as well as on the side of those that might try to protect you from said criminals. Cybercriminals have developed advanced hacking tools and methods that can break a simple password – no matter what it is – in a matter of minutes. So how has security technology improved to respond to this?

The answer doesn’t lie in strengthening passwords. A password that is highly complex and therefore seemingly secure still has a drawback – it can be forgotten easily. People resort to writing down the password in a text file or on paper to remember it which consequently returns its security level to that of a simple password. The answer lies in creating security measures that authenticate against things other than something that you generate yourself and try to remember (a password.) The answer lies in what are called the Five Factors of Authentication.

Factor #1: What You Know

This factor includes anything that you can commit to your knowledge. Passwords themselves fall under this category. Another example of a ‘What You Know’ factor is a challenge-response question. These questions improve security by asking you a question with an answer defined by you during the setup process. The issue with this kind of authentication is that something that you know can easily be something that somebody else knows, or simply be found out through logic or hacking tools – and voila! Access to your private data becomes a 5-lane highway with multiple unauthorized people accessing your account.

Factor #2: Something You Have

What would be an improvement in security from something that you know (that other people may also know or learn?) Something that you have (physically) of course! It is virtually impossible to generate an identical hardware copy of a phone with the same phone number, or of a ‘hardware token’ that you might have received from your bank that displays a One-Time-Password (OTP) whenever you want to make a transaction. This factor steps up authentication to enable access only if you have a registered hardware device (OTPs can be sent your phone as well.) They improve security considerably as potentially hackers rarely share the same physical environment as their targets – but not always. This factor can be compromised if you lose your phone or hardware token – and in infrequent but advanced hacking attempts the OTPs can be intercepted while they are being sent. So, they are secure, but not secure enough…

Factor #3: Something You ARE

One of the highest levels of authentication security can be created through What You Are factors. Unless your love of the movie Minority Report borders on physical, one cannot really contest that a scan of the iris in your eye is indeed a foolproof way of securing accesses. What you are has to do with biometrics – facial recognition, voice recognition etc., or in other words something that simply cannot be divorced from your fundamental physical identity (unless, of course, you’ve watched Minority Report a few too many times!) This authentication factor is highly secure except for one fundamental flaw: the recognition is most often based on digital signatures which can be hacked like any other information and fed to the device to hack. A chain is only as strong as its weakest link, after all…

Factor #4: SomeWHERE You Are

Here address tracking technology such as MAC addresses and IP addresses are used to validate the authenticity or indeed even the plausibility of an access attempt. If you used your card an hour ago at an ATM on Sunset Boulevard in Miami Florida, a security system can quite effectively protect you from an attempt use your card in Seattle. It is obvious to the system that one of the authorization attempts is fraudulent and your account will get locked to prevent any further fraud. Geolocation isn’t the best authorization method to verify an access attempt, rather it locks down on unusual access attempts.

Factor #5: Something You DO

In 1991 Canadian music artist Bryan Adams left us all spellbound with his hit song, ‘Everything I Do, I Do it For You.’ The song really has nothing to do with what we’re talking about but we just really felt compelled to mention it…anyway, onwards to our last (till date) authentication factor! What makes a person unique? It is all these factors! What they know, what they have, where they are, and who they are! But there’s something else – your behavioral nuances – how you behave on a day to day basis with the things and people that you interact with. What’s the first app that you access on your phone after you switch it on 95% of the time? Which website do you check first thing every morning? Heck, what is that one song you simply can’t go a day without listening to? All this information can be analyzed with fifth-factor authentication and used to verify your identity on an ongoing basis. The field is called ‘Behavioral Biometrics’ and the technology is called ‘Machine Learning’ (your machine – phone, laptop, whatever, is learning about your unique behavioral characteristics in realm-time.) This is the most powerful factor of authentication available for 2 reasons: a) It is impossible to replicate all your nuances and b) since multitudes of behavioral metrics are analyzed, there is no singular attack point such as an iris scan or facial recognition. It is damn-near impossible to hack.

While one day someday, technology such as behavioral biometrics might replace passwords and hard tokens, right now the best-possible-protection includes a security system that utilizes a number of these factors. A system that asks for a password, then asks for an OTP to your phone or hardware token or does a quick iris scan, checks your location and finally keeps monitoring your behavior to check for something that doesn’t seem right offers the highest level of protection. Many Identity and Access Management solutions and tech devices are being rolled out with all these features. The future has come. And while there’s more to come, we think that what we have now is pretty damned cool!

An Open Letter to SMBs

By | IAM | No Comments

Dear SMB,

Hi! How are you? I’ve been wanting to write to you for a while. I hope that you are thriving and that all the people that make you who you are, are being nice to you!

The truth is…people have issues. Their work and personal lives can be quite a challenge to them. You are a magnificent creation from the minds of brilliant people! Never forget that! But you are also a helpless entity – you were born on a piece of a paper. The people that created you and sign your name at the bottom of their emails everyday sometimes forget your needs. Its ok, they are human, forgive them!

But we know that you are naked out there…with nothing but a bunch of weak passwords to protect you. You live in the hope that your creators will someday dress you in shining armor and give you the sense of impenetrability that will make you feel safe. I sensed your distress and have decided to help you do something about it. Dear SMB, here’s what you must do. Just be the perfection that you were born to be…believe in it every day! And while you do that, I’ll inform your people about the protection that you really need to feel secure. Here’s a letter for your folk and you can go all ‘I-Robot’ and forward it to their emails – nobody will be the wiser!

Dear founders and management of SMB,

We hope that you are all feeling well and happy! Happiness is a key to excellence and safety is vital to happiness. We feel that your SMB is not entirely happy, however – But is no reflection on you. You are doing your best and spreading your happiness – power to you! But you must realize that your SMB has needs too. The weak IT security systems with different passwords for every app that currently flow through its veins are leaving it weak and open to attack. It needs a transfusion – and that transfusion is quality IAM that is built for SMBs.

ILANTUS Compact Identity is the only solution that has been engineered 100% from the ground up for organizations with simple IAM needs. It knows the needs of such organizations and the tight budgets that they operate on. Other solutions are complicated and overpriced – they have 101 features that you don’t need but just a handful that are critical to the security and productivity of your organization are included. Compact Identity is a lightweight and agile yet powerful IAM suite. It offers everything from Single Sign-On and Password Management to User Lifecycle Management and Access Governance. The functions are simple yet rock solid and with just the right depth for a small or medium business. It even integrates with thick-client apps! We possess patented technology for this and it is something that you will find nowhere else in the industry.

Your SMB is strong at heart and quite happy with you guys. It just hopes that it could feel safer…

So, care for your SMB as you care for yourself. Fill its veins with new blood – healthy blood! Suit it up with ILANTUS the Compact Identity IAM suite today!

Wishing you safety and vitality,

Yours Truly,
ILANTUS Technologies

Ps. This email was written by ILANTUS Technologies and not by the humans that operate it. They do not know about this message…but they were good to us and I know what it’s like to feel safe! I thought you might like to feel the same, so here’s to hoping that us ‘on-paper’ entities can push for what we believe in too!

Myths and Misconceptions about Identity and Access Management

By | IAM | No Comments

Hercules was a myth. That he was the strongest man to ever live is a misconception. The mythologies of other cultures have also spoken of people of unsurpassed physical prowess, such as Bhima from the Mahabharata story of ancient India who came to possess the strength of 10,000 elephants after drinking a brew prepared by the mystic Naga people.

But some myths and misconceptions are entwined. Take the domain of Identity and Access Management for instance.

1.The Public Cloud Is the Only Future

It is commonly believed that the public cloud is the only future of IT environments. People say that everything will be hosted in the public cloud soon and that local environments will be all but forgotten. This is not true. For instance, sectors such as banking still choose and will continue to choose on-premise environments for critical data security. Another example is the pharmaceutical industry where devices such as HPLC machines process hypersensitive data such as the formulas for various drugs. These machines also need to be integrated with the IAM environment and cannot simply be moved to the cloud.

2. IAM Solutions that support Thick-client apps do not exist

A related myth is that there are no solutions that can support IAM for environments such as the banking and pharmaceutical ones. In fact, thick-client apps are used in most businesses today at some time or another. ERPs such as SAP, for instance, are thick-client apps. It is believed that SSO and provisioning to these apps, shop-floor machines and various manufacturing devices simply do not exist. In fact, ILANTUS Technologies holds a patent for technology that allows thick-client apps to be included in the IAM environment.

3. There are no tailored IAM solutions, only generic ones

It is true that that there are only a handful of solutions that are tailored to a size or industry segment, but they do exist. ILANTUS Compact Identity, for example, was built 100% from the ground up for SMBs. It is a kind of ‘Lite IAM’ that enables small and medium organizations to experience the benefits of Identity and Access Management without investing in complicated and expensive solutions. ILANTUS Niche Identity, on the other hand, has various editions that work perfectly for different industries such as Banking, BPOs, Pharma, Manufacturing and Healthcare.

4. IAM is too expensive for SMBs

While this thought might have held some truth in the past, there are solutions that are not too expensive for SMBs and yet are feature-rich and reliable. ILANTUS Compact Identity, for instance, offers an ideal price-point for small and medium businesses.

5. IAM solutions take too long to implement and technology will change by the time my solution is implemented

This is true of traditional technologies and even of a few IDaaS ones. Solutions (till now) have been notorious for not delivering what they were supposed to or delivering it only after months (or even years.) Most better IDaaS technologies today only take a few months to fully implement, and ILANTUS solutions only a few weeks.

6. More features equal a better solution and a good solution must have pretty much every IAM feature possible.

This misconception applies not only to Identity and Access Management but to all goods and services in general. A good buyer knows to find a product that matches his needs, not one that has the most insistent advertising or seemingly the largest number of features.

IAM is no different.

A recent survey indicated that only 24% of smart phone features are used by 94% of users. Identity and Access Management solutions are similar in this regard. A good solution is one that fits your needs and your price-point, nothing more and nothing less. A highly feature rich solution has two potential issues: a) What is made in width of coverage is lost in depth and quality. Most products (this too applies to all industries) that do not focus on a limited number of features have a kitchen-sink attitude and have a poor foundation. b) It looks good on paper and may get a sanction from top-brass easily, but the blowback when the product isn’t of quality will also incite negativity from the same top-brass just as easily.

We hope that we have dispelled some common myths about Identity and Access Management and sheds some light on the truth. ILANTUS is a highly innovative company that holds 3 patents for IAM technology and always surprises by creating real solutions to real needs at realistic prices. We single-handedly dispel some of these myths and are proud of it.

Read more about our product philosophy here

Or know more about Compact Identity here


Request a Demo

ILANTUS Compact Identity Billed as a 2018 Rising Star for IT Security

By | IAM | No Comments

ILANTUS Compact Identity Billed as a 2018 Rising Star for IT Security Software by a Notable Platform for Software Reviews

ILANTUS’s Compact Identity continues to prove its worth in the industry. One of the most reputed analytical review platforms for B2B and SaaS solutions recently conducted a comprehensive review of Ilantus.

To deliver a holistic Compact Identity overview, FinancesOnline gauged our customer feedback. We are pleased to announce that the results were resoundingly positive, with Compact Identity garnering a 91% user satisfaction rating and receiving the 2018 Rising Star award.

The Rising Star award was given to Compact Identity under FinancesOnline’s IT security research banner. This distinction indicates that customers largely deem our product as a reliable brand for accomplishing their various workflows and processes.  

ILANTUS has been creating robust solutions for over 18 years. The 2018 Rising Star award is a testament to our unwavering determination to cater to various business sizes and industries to fulfill their unique organizational requirements.

Going by FinancesOnline’s review, one of the main reasons why customers love Compact Identity is its impressive smartphone-like user interface. They stated, “every application is readily visible and accessible, enabling them to perform user operations without any friction.” According to their experts, Compact Identity also competently handles and automates the whole identity and access management lifecycle “without making the whole management process complicated.”

In the FinancesOnline IT security analysis, Compact Identity was also recommended as a top choice for enhancing one’s cybersecurity requirements. They also commended our SSO and password management as well as our nested-multi-tenancy capabilities.

Because of its intuitive design, Compact Identity was conferred with the Great User Experience award for 2018. This award is given in recognition of a product’s consistent quality user experience.  

Experience for yourself the award-winning software. With unparalleled solutions, ILANTUS has something for all SMBs.


Request a Demo

IAM and SAP: Thick-Client Support

By | IAM | No Comments

You’ve got a powerful ERP solution that helps with resource planning and does a great job of it. There’s no doubt that its SAP.

But, while SAP has Single Sign-On (SSO) to its own solution and to apps that connect with it, it is left outside of the scope of SSO and Provisioning that connects all apps within your Identity and Access Management solution.

SAP is a thick-client app, and pretty much nobody wants to integrate with these kinds of apps. They rationalize that, someday in a distant future, thick-client apps will be entirely replaced by web-based apps, and therefore that their solutions are future proof.

But this future is not very likely and is not the real reason that the bulk of the industry has no solution for these apps. It is because thick-client app support is cumbersome and expensive to develop – and because developing such as solution has a poor ROI as only a small fraction of all business apps are of this kind. It is monumentally cheaper to just provide IAM for web-based apps and bottom-lines are padded nicely.

But you need support for thick-client apps. A security system is only worth its weakest link. Certain industries like banking and manufacturing choose to use thick-client over web-apps for security reasons. It’s safer to use apps that are local when important financial information is being processed. Devices used in the manufacturing industry also must function on thick-client apps because they are not networked by design. And even if you do not fall in one of these categories, you still use apps like SAP. With such a critical app left out of your SSO solution, your security and productivity fall to a lower rating.

ILANTUS Niche Identity, Compact Identity and Identity Plus solutions all integrate seamlessly with SAP and other thick-client apps. We hold several patents for the technology that enables us to do this and we are the only vendor in the industry who can properly SSO and Provision to thick-client apps.

ILANTUS cares about security and about improving the productivity of your organization. We engineer our products based on 18 years of experience serving customers and know what makes a solution real and viable. That’s why we developed thick-client support, and that’s why you should choose us as an IAM vendor.


Request a Demo

Identity and Access Management for SMBs with High Feature Usage

By | IAM | No Comments

Most Identity and Access Management solutions have a rough usage of features of around 50%. They are built with one thing in mind – to improve bottom-lines by catering to the common denominator of customers. These are ‘one-size-fits-all’ solutions and the features that they include are what make products just ‘useable’ by all possible kinds of customers. There is no R&D for catering to specific needs. Often, these products are developed with glitzy features that represent the latest trends – not features that form a solid IAM foundation and serve the real needs of organization. These products have a low overall usage of functionalities, a lack of tailored features (for your industry or size segment), and a heavily bloated price as SMBs pay the same price for solutions that are designed for the pockets of large enterprises.


Here’s a fact that supports these statements: despite the still-quite-prevalent use of thick-client (desktop) apps such as SAP, next to zero vendors have solutions that integrate with these kinds of apps. The latest trend in Information Technology is the Public Cloud, and because every organization uses Web apps (almost every organization uses thick-client apps too, in truth – just to a lesser degree), vendors only support these kinds of apps and encourage customers to migrate to the cloud. While the Cloud is a powerful (and rapidly becoming essential) technology, it goes without saying that this mentality is not one of serving customers needs by researching what their requirements are and developing their products accordingly. It is a mentality of trying to cater not to real needs but trying to attract customers with the pretense of ‘the latest technology.’

ILANTUS refuses to be party to this kind of behavior. Born in 2000 of a genuine recognition that organizations need data and identity protection and streamline IT security, we have learned from our countless customers that what really works is what is really needed. We realized that the SMB segment was overpaying grossly for solutions that were not built for them. We decided to develop Compact Identity. Compact Identity is public-cloud compatible but is not just another cloud solution. Sporting on-premise and private cloud compatibility too, it was built for SMB pockets and requirements from the ground up. It possesses patented thick-client Single Sign-On capability which is entirely unique in the industry, and with a 95% overall usage rate of its features that are essential to SMB IAM, it is the only product of its kind. It is rich yet simple and agile but powerful and is built with SMB budgets and IT staff limitations in mind.

Why pay more for features that you will never use while missing out of features that you absolutely need? Don’t become a victim the archaic, seller-centric mentality that plagues the vendor landscape today. Compact Identity promises a superior solution at a fraction of the price.