Read more about the latest developments on Identity Governance & Administration

Managing a 1:1 learning environment in K-12

It’s no secret that Kindergarten – 12th grade is quickly moving to an eLearning environment. Research has shown that implementing 1:1 technology programs in the classroom can significantly increase student motivation, engagement and collaboration. Accordingly, schools across the country are purchasing laptops, Chromebooks and tablets, pushing the boundaries to further education.

Read more

Part 3: Mitigating the risk of internal breach

In parts 1 and 2 of this blog series, we outlined how access governance, single sign-on and automated provisioning ensure that users have accurate permissions and access within an organizations hybrid IT environment, both on premise and in the cloud. Today, I want to focus on cleaning up file shares to ensure the aforementioned solutions have a clean slate from which to operate. If you think about it akin to cleaning a room, you would pick clothes off the floor before vacuuming it, right? Similarly, you should clean up your file system before allocating resources in to securing it.

Read more

Part 2: Mitigating the risk of internal breach

In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization’s network. Today we are going to discuss how to take it a step further, and protect against these internal threats in a hybrid IT environment. There are many solutions on the market focused solely on cloud data protection or network data protection. We have found the reality of most IT environments to be a combination of both. To best offer guidance in protecting against internal threats, let’s look to a hybrid solution for a hybrid problem; namely, HelloID.

Read more