Identity and Access Management (IAM) is a framework of policies and high standard technologies built to ensure organizational users are granted the appropriate access to resources. Read more about What is Identity and Access Management? Many factors come in play to make this process successful....
Blog
SSO on the go!
Where do you physically work? In an office? At home? At a table in your local coffee shop? It is becoming more common for employers to allow their employees to work outside the traditional office space. With the use of laptops, tablets and mobile devices there is little reason for an employee to...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to gauge customer expectations,...
How a successful password management solution would look in your organization
I want you to close your eyes for a moment… Well obviously you can’t close your eyes and read this, so keep them open; but imagine a world where your email inbox alerts come in sparingly, your chat box rarely pings, and the phone almost never rings… (Except for Gary down the hall, wanting to know...
The Advantages of the Cloud
Cloud computing has opened up a new world of IT infrastructure that poses many advantages for organizations such as enhanced accessibility, scalability, cost efficiency and security. Let us take cloud based access workflows for example, they offer many advantages over traditional self-hosted...
Web SSO vs Enterprise SSO
Currently, the number of applications and software solutions in use by businesses is increasing rapidly. It is not uncommon that one business may utilize dozens of applications, each with their own set of credentials for each user. Many of these applications (both on premise and cloud-based) have...
SSRPM Saving the Helpdesk Time
Forgetting a password can be quite an ordeal without a self-service reset system in place. You have to call the help desk, provide your information, wait for a ticket to be created, be assisted by the next available agent or at times you may have to wait for a call back. Where this gets even more...
Access Governance Solutions Ensure Network Security Compliance
In a corporate environment, the most important aspect of protecting the security of your network is by leveraging software to ensure users do not have permissions to files and applications that they should not be able to access. There are many ways you can leverage software to ensure proper...
Connecting Office 365 to Identity Access Management Solutions
Microsoft Cloud is revolutionizing the way organizations across various industries operate; providing various services at a minimal cost and scalability that fits the needs of any organization. Microsoft’s productivity service Office 365 has opened the doors for employees and students, allowing...
HelloID for the ‘Non-Techspert’
Do you ever find yourself nodding along when it comes to technology but not really knowing the in’s and out’s of what’s being said? The challenge (and beauty) of technology is that the second you're up to date, your information is old and has since evolved once again. As a with a relatively good...
Advanced Authentication Methods
In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape our technological landscape...
Relaxing Summers: How to Provide for EDU IT Staff
As summer is upon us, not everyone in your school district is looking forward to a relaxing few months. System Admins often need to prepare for the new school year by making all the appropriate changes to their network. Hundreds of students need to be added and have accounts created for them,...
Why SSO? Four Simple Ways SSO is Beneficial
With so many passwords to remember today, the answers are abundant: Single Sign-On solutions (SSO) have been around for a while now, and for good reason. They are extremely helpful for many areas of your organization and require minimal effort to implement and use. Here are four ways that SSO is...
How IAM Connectors Work
Connectors to automated account management solutions allow you to make changes within all sorts of systems whether they are cloud or self-hosted systems, easily and automatically. When purchasing this type of solution, it is important to ensure that the vendor has, or can build the connectors you...
Are your new employees annoyed by the onboarding process?
There is always a level of excitement when starting a new job, with that enthusiasm comes added energy with fresh ideas and wanting to bring as much to the table as possible. The one thing that can damage this momentum is being held back from actually performing the job. It is not uncommon when a...
Three Ways Your Organization Can Ensure Security
It’s common sense: Data security is important in every industry. Every organization, thus, must deal with internal data or customer data which, if breached, can cause major issues for the organization, its team members and its customers. Here are three useful tips on how to ensure security!...
What is the Next Step in the Evolution of the Password?
Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to allow multiple researchers to...
To hack or not to hack?
Asking companies for their password policy on a regular basis, I find that many organizations have no strict policy on passwords, which results in an immediate risk to the organization. Microsoft's security best practice advice is to: let the password expire every 30 to 90 days, to enforce...
Maturity in Authorization management
Access Governance (AG) ensures that employees have the appropriate entitlements to perform their duties. A reliable Access Governance model makes sure that the proper base of entitlements are provisioned to them when starting a new job, transferring to a different department or begin start working...
How to Ensure Against Duplicate User Accounts In Your Network
When integrating an Identity & Access Management automated routine with a human resource system, locating a unique identifier to be used across each system is key. Typically, the employee ID or social security number is optimal, as it unique to each employee. Within many industries, it is...
How can meeting mandatory audit requirements also benefit the health of your organization?
Meeting audit requirements are often required for many organizations, but the process is often cumbersome and requires a great deal of time and effort. There are ways, though, to make the audit process much easier, while also gaining the additional benefit of long-term growth and health of your...