Authorization requests and requisitions are a part of life for most businesses. Employees make all types of requests for purchasing equipment, role changes or requesting additional access to systems/ applications. Authorization request processes may have different details, but they generally...
Blog
Your Employees Are Most Likely Using Simple Passwords
One way to improve security is forcing employees to use unique passwords that are regulated by their employer. The stronger the password the stronger the security. There are software options that will allow employers to extend the password complexity rules and enforce numerous password rules....
Benefits of Connecting with EPIC
If your organization uses EPIC you know how tedious and time consuming it can be to manage user accounts in the application. Each time a new nurse, doctor, or other employee joins the organization an account needs to be manually created for them and access rights granted. Often an employee will...
Web SSO vs Enterprise SSO, Revisted
With the continued increase of applications hosted in the cloud, organizations in all industries struggle with providing simple and secure access to their employees. This includes from within the organization's network on company-owned computers as well as from device including laptops, tablets...
Is ‘password only’ authentication secure enough?
With Identity and Access Management (IAM) being the framework for facilitating of access to various resources, security has become a paramount concern among the personnel that manage these identities and the environments in which they exist. With each passing day, news organizations of the world...
What Every Network Administrator Should Know About Account Management
Each and every Network Administrator can tell you the most boring, mundane, repetitive, time-consuming, and coincidentally crucial part of their job is creating and maintaining user logons, permissions, and group management. It’s boring and mundane because it is a manual time-consuming process...
Leveraging Group Policy Objects: What They Are & Achieving Seamless Integration
In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings on local stations, are just...
Helpdesks Receive More Than 100 Calls Per Week. How Can This Number Be Reduced?
It is no secret that helpdesks are overwhelmed, often by mundane and repeated tasks that can, or should, be automated. According to recent survey, IT and help desk employees often are required to address an overwhelming number of calls each day. On average a help desk receives more than 100 calls...
Applied, Accepted, Enrolled, & Hold: Leveraging IAM Solutions and O365
It’s well known that for some time both Microsoft and Google provide free email hosting services for “.edu” domains, but it’s not until recently that the playing field has leveled off. Google has arguably had the advantage since the beginning due to the fact that even if the place of learning in...
Automating Password Reset Enrollment
Using a self-service reset password management application can be a cost effective way of reducing the volume of calls made to the helpdesk. One major hurdle of implementing a self-service reset password management system though is getting every user in the organization enrolled into the software....
Reducing Account Management Headaches With Automation & Workflows
Account provisioning has become increasingly complex over the years. Due to limited IT budgets and over worked staff, it could take days or even weeks for a new employee to have the full access they need to critical internal systems. This can be extremely frustrating for the end user and can cost...
Password Issues, Human Capital, & Productivity
We have all seen it before, the desk that has a million and one yellow sticky notes all over the monitor, or on the wall, or even all over the desk itself. These sticky’s contain the user name and password of all the systems and applications that end users need to log into in order to complete...
Credential Delegation for Employees on Leave
In many situations, authority to access a specific application is given to only chosen individuals, for security reasons. This can become an issue when that individual is out of the office for an extended period of time, and others who are dependent on this application, are left without the...
5 Signs You Need A Password Management Solution
1. Your users access multiple application each requiring a password. Depending on their job function users can access anywhere from 5 to 20 applications per day. With this many passwords to remember the simple act of logging in to each application can take longer than need be. A user would have to...
The Future of Access Security
As hackers become more advanced, security measures need to stay one step ahead of the game. This is why it is important that security is always evolving. So what is to come for security methods in the near future? While some security measures are futuristic, such as the interesting world of the...
User Account Management in Education: The True Cost
The pace of technology today is rapid, and student bodies continue to embrace it at an exponential pace creating an ever increasing demand for internet based services crossing many different areas of the organizational structure. Ask any student or faculty member how many web based services they...
How IAM Solutions Can Help Non-Profit Organizations
In the Non-Profit sector, it is not uncommon for the IT department to be faced with cutbacks and staff reductions. IT managers are constantly searching for ways to reduce time consuming manual IT processes and work smarter with a shrinking budget. One proven way Non-Profit organizations can save...
5 ways to know you need an IAM solution
“Implementing an Identity and Access Management solution.” This sentence scares many organizations and their CEO’s. Though, yes, it does cost money, it is probably not as much as you think and can most likely save your organization money in the short term. Every organization faces password and...
How does MFA benefit my organization
You may not realize it but you have probably used multifactor authentication already in your daily life. Have you made a purchase with a credit card and entered your zip code after the card was swiped? This is a form of two-factor authentication; the credit card itself was the first form and the...
Lending access to temporary employees or contractors
Do you share company information with individuals you don't employ, such as independent contractors? Is this really a good idea? Many organizations find that they need to give contractors, temps, etc. access to their network in order to perform their jobs, but this may become a major issue....
Waiting for access…a day in the life of a new employee
For many organizations the first day in the life of a new employee tends to be quite unproductive. This is largely due to the fact that access to the systems said employee requires in order to begin training, and working, in a productive fashion have yet to be provisioned. Why is this phenomena so...