Credit Unions, like many other types of organizations can benefit from implementing Bring Your Own Device (BYOD). But how? Doesn’t this only work for certain types of organizations? One of the main benefits that many credit unions see from implementing BYOD is lower costs associated with...
Blog
Virtual desktops and SSO: how they complement each other
Virtual desktops have become extremely useful in many different industries. They allow for many users to login and work from a single computer. This is quite common in hospital settings, where doctors are moving from room to room and need to work from different computers in different locations....
Automating Telephony Systems: Save Time & Headaches
Telephone systems play an important role in organizations, since employees in almost all industries each use their own phone and extension for communication internally and externally. When a new employee joins the company they need to be assigned a new phone and extension; when they leave the...
Identity & Access Management vs. Identity Governance & Administration
Identity and access management and identity governance and administration are two similar terms used often in the tech world, which can create some confusion. What do they mean? Are they the same thing? How are they different? What can they do for my organization? First, while the terms are...
Allowing patients to use tablets in a healthcare setting
One of the newest trends in healthcare is allowing patients more access to information about their own care, including being able to see their health records and communicate with their physicians through mobile devices, especially during in-patient stays. Patients now a day want to be able to stay...
How one simple solution can reduce the HIPAA headache
Compliance is an ever present, ever changing issue facing a number of industries across the nation. Failing to adhere to the complex issues can warrant severe fines and penalties costing businesses tens or even hundreds of thousands of dollars. One of the largest regulating acts in an industry is...
Connecting O365 to IAM Solutions
Cloud solutions such as Office 365 have many benefits such as allowing network administrators to take the burden of maintaining servers off their plates by putting their document management, mail servers and instant messaging solutions into the cloud. Additionally, it allows users to interact with...
Boost Customer Service with a Knowledge Base
What is a knowledge base and how can it help your organization? A knowledge base is a collection of information in the format of subject, problem, and solution. It is meant to be easily searchable, so that users can quickly find the answers to questions that they have. A knowledge base can be an...
Understanding IAM Better
Many people have a general idea of what IAM is, or may think they do, but do not fully understand the entire picture or concept. Though many believe that Identity and Access Management is about security, that is only a small part of it! Gartner defines IAM as “The security discipline that enables...
Google Services, iPhone 5, & Education: Some Common Problems
Google continues to roll out their services to all iOS devices which have been extremely beneficial for educators. However with the various synching and performance issues that have been slowly creeping to the surface, will the iPhone 6 pose a problem for the help desk to roll out password resets,...
IAM for Small Businesses: Is it Necessary?
Are you a small/medium sized business owner? While often overlooked, smaller businesses, like large organizations, frequently have numerous identity and access management issues. These include ensuring security of systems and applications, as well as handling copious password issues. Unlike large...
Password Issues After Helpdesk Hours
What is your current process for when a student forgets their login or password after hours? If the helpdesk/ IT department is not available after schools hours, are the students simply out of luck? The prevalence of online and night classes has made life easier and better for students that need...
Is Single Sign On (SSO) Secure?
Single sign-on allows users to log into multiple accounts using one set of credentials. This is beneficial to both the help desk and the end user, since the end user does not have to remember multiple sets of credentials, therefore reducing the number of help desk calls to reset passwords. As...
What’s the Future of Cloud SSO?
Not so long ago, applications were always managed on-site. The IT department dominated the company network and kept it safe against the outside world by means of firewalls and virus scanners. This meant that implementing a Single Sign On (SSO) solution in the network used to be relatively easy....
Dealing with Security-Produced Password Issues
Customer and employee privacy is vital within every organization. Because of this, government rules and regulations are put in place to protect personal information and determine who can gain access to accounts. While guarding internal and external material is crucial, the security processes put...
Easy Credential Management
A seemingly simple, yet tedious task for anyone in the information technology field is credential management. End users are given usernames and passwords for various systems in an organizations environment, and the hope is that the end users can manage these credentials with very little issue or...
Simplified Management for Distribution Lists
As a system administrator, managing a large number of distribution lists can be a tedious task. Parsing through email requests and support tickets for adding and/or removing distribution list members, with the occasional approval required from upper management, can easily result in a full day of...
SSO: More Than Just Single Sign-On!
You probably know that Single Sign-On (SSO) software allows users to login with a single set of credentials, but there is much more to SSO than that! Did you know that SSO has many other features which save both your employees and helpdesk a lot of headache? Here is a brief outline of some...
Does Managing Contractor Accounts Give You a Headache?
Does your company hire outside workers or contractors who work for a limited amount of time at your organization? Managing these types of accounts can be a headache since there is constant movement, and employees of this type need to be quickly added but then also promptly removed when they are no...
Battle of the Email Solutions: Exchange vs. Google Apps
In the industry I am in, with the job functions I perform daily, I see more and more organizations moving from an in-house email solution such as Exchange to cloud-based email solutions like Office 365 and Google Apps. This is due to many reasons and an easy way to see why is to compare Exchange...
IAM & Course Folder Management: A Surprisingly Unknown Solution Feature
There is a lot of functionality which makes up an IAM solution but course folder management is functionality which continues to astonish system admins. When obtaining an identity management product, one would not expect the ability to manage the full lifecycle of student course folders, but this...