Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...
Identity & Access Management
Attestation & Reconciliation – what is it and why do you need it?
Identity and Access Management (IAM) is a framework of policies and high standard technologies built to ensure organizational users are granted the appropriate access to resources. Read more about What is Identity and Access Management? Many factors come in play to...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to...
Access Governance Solutions Ensure Network Security Compliance
In a corporate environment, the most important aspect of protecting the security of your network is by leveraging software to ensure users do not have permissions to files and applications that they should not be able to access. There are many ways you can leverage...
Connecting Office 365 to Identity Access Management Solutions
Microsoft Cloud is revolutionizing the way organizations across various industries operate; providing various services at a minimal cost and scalability that fits the needs of any organization. Microsoft’s productivity service Office 365 has opened the doors for...
How IAM Connectors Work
Connectors to automated account management solutions allow you to make changes within all sorts of systems whether they are cloud or self-hosted systems, easily and automatically. When purchasing this type of solution, it is important to ensure that the vendor has, or...
Are your new employees annoyed by the onboarding process?
There is always a level of excitement when starting a new job, with that enthusiasm comes added energy with fresh ideas and wanting to bring as much to the table as possible. The one thing that can damage this momentum is being held back from actually performing the...
Three Ways Your Organization Can Ensure Security
It’s common sense: Data security is important in every industry. Every organization, thus, must deal with internal data or customer data which, if breached, can cause major issues for the organization, its team members and its customers. Here are three useful tips on...
What is the Next Step in the Evolution of the Password?
Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to...
Maturity in Authorization management
Access Governance (AG) ensures that employees have the appropriate entitlements to perform their duties. A reliable Access Governance model makes sure that the proper base of entitlements are provisioned to them when starting a new job, transferring to a different...
How to Ensure Against Duplicate User Accounts In Your Network
When integrating an Identity & Access Management automated routine with a human resource system, locating a unique identifier to be used across each system is key. Typically, the employee ID or social security number is optimal, as it unique to each employee....
How can meeting mandatory audit requirements also benefit the health of your organization?
Meeting audit requirements are often required for many organizations, but the process is often cumbersome and requires a great deal of time and effort. There are ways, though, to make the audit process much easier, while also gaining the additional benefit of...
Easy Authorization Requests & Requisitions
Authorization requests and requisitions are a part of life for most businesses. Employees make all types of requests for purchasing equipment, role changes or requesting additional access to systems/ applications. Authorization request processes may have different...
Is ‘password only’ authentication secure enough?
With Identity and Access Management (IAM) being the framework for facilitating of access to various resources, security has become a paramount concern among the personnel that manage these identities and the environments in which they exist. With each passing day,...
Leveraging Group Policy Objects: What They Are & Achieving Seamless Integration
In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings...
Reducing Account Management Headaches With Automation & Workflows
Account provisioning has become increasingly complex over the years. Due to limited IT budgets and over worked staff, it could take days or even weeks for a new employee to have the full access they need to critical internal systems. This can be extremely frustrating...
5 ways to know you need an IAM solution
“Implementing an Identity and Access Management solution.” This sentence scares many organizations and their CEO’s. Though, yes, it does cost money, it is probably not as much as you think and can most likely save your organization money in the short term. Every...
Waiting for access…a day in the life of a new employee
For many organizations the first day in the life of a new employee tends to be quite unproductive. This is largely due to the fact that access to the systems said employee requires in order to begin training, and working, in a productive fashion have yet to be...
Credit Unions and BYOD: The Benefits of “Bring Your Own Device”
Credit Unions, like many other types of organizations can benefit from implementing Bring Your Own Device (BYOD). But how? Doesn’t this only work for certain types of organizations? One of the main benefits that many credit unions see from implementing BYOD is lower...
Identity & Access Management vs. Identity Governance & Administration
Identity and access management and identity governance and administration are two similar terms used often in the tech world, which can create some confusion. What do they mean? Are they the same thing? How are they different? What can they do for my organization?...