With Identity and Access Management (IAM) being the framework for facilitating of access to various resources, security has become a paramount concern among the personnel that manage these identities and the environments in which they exist. With each passing day,...
Identity & Access Management
Leveraging Group Policy Objects: What They Are & Achieving Seamless Integration
In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings...
Reducing Account Management Headaches With Automation & Workflows
Account provisioning has become increasingly complex over the years. Due to limited IT budgets and over worked staff, it could take days or even weeks for a new employee to have the full access they need to critical internal systems. This can be extremely frustrating...
5 ways to know you need an IAM solution
“Implementing an Identity and Access Management solution.” This sentence scares many organizations and their CEO’s. Though, yes, it does cost money, it is probably not as much as you think and can most likely save your organization money in the short term. Every...
Waiting for access…a day in the life of a new employee
For many organizations the first day in the life of a new employee tends to be quite unproductive. This is largely due to the fact that access to the systems said employee requires in order to begin training, and working, in a productive fashion have yet to be...
Credit Unions and BYOD: The Benefits of “Bring Your Own Device”
Credit Unions, like many other types of organizations can benefit from implementing Bring Your Own Device (BYOD). But how? Doesn’t this only work for certain types of organizations? One of the main benefits that many credit unions see from implementing BYOD is lower...
Identity & Access Management vs. Identity Governance & Administration
Identity and access management and identity governance and administration are two similar terms used often in the tech world, which can create some confusion. What do they mean? Are they the same thing? How are they different? What can they do for my organization?...
Connecting O365 to IAM Solutions
Cloud solutions such as Office 365 have many benefits such as allowing network administrators to take the burden of maintaining servers off their plates by putting their document management, mail servers and instant messaging solutions into the cloud. Additionally, it...
Boost Customer Service with a Knowledge Base
What is a knowledge base and how can it help your organization? A knowledge base is a collection of information in the format of subject, problem, and solution. It is meant to be easily searchable, so that users can quickly find the answers to questions that they...
Understanding IAM Better
Many people have a general idea of what IAM is, or may think they do, but do not fully understand the entire picture or concept. Though many believe that Identity and Access Management is about security, that is only a small part of it! Gartner defines IAM as “The...
IAM for Small Businesses: Is it Necessary?
Are you a small/medium sized business owner? While often overlooked, smaller businesses, like large organizations, frequently have numerous identity and access management issues. These include ensuring security of systems and applications, as well as handling copious...
What is the Best Backend Database for an IAM Solution?
If you have day to day dealings with IAM software, you will learn with most products you need a database backend. There are many choices including Oracle, Sybase, Informix, and many more. In my experience though, while none of these are bad, Microsoft SQL seems to be...