Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

Policy Based Access Control (PBAC)

What is Policy Based Access Control (PBAC)?

Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.  Organizations rely on a wide range of applications and operating systems to securely deliver value to their customers efficiently and effectively. In addition to this complexity, businesses are also working across multiple environments (OnPrem …

What is Policy Based Access Control (PBAC)? Read More »

biometrics

An Introduction to Biometrics for Identity Management

In this article, we provide an overview of Biometrics and how they can be used to manage identity.  At the beginning of 2020, Cybersecurity pundits have already made their predictions about what the threat landscape will look like this year. While some have predicted gloom and doom scenarios, others believe that it will be the …

An Introduction to Biometrics for Identity Management Read More »

HR Rebellion

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they …

Mastering Identity Management: Is HR Creating a Hostile Work Environment? Read More »

privacy and cybersecurity articles

9 Privacy and Cybersecurity Articles, March 2020

Thanks for checking out the Idenhaus Identity Management and Cybersecurity biweekly digest. Every 2 weeks, we curate a selection of IAM, Healthcare IT, Identity Governance, Privacy and Cybersecurity articles. Check out our resources section for webinars, case studies, infographics, and educational videos. To receive the top Identity Management, Privacy and Cybersecurity articles in your inbox …

9 Privacy and Cybersecurity Articles, March 2020 Read More »

healthcare iam roadmap

3 Key Considerations for Your Healthcare IAM Roadmap

Learn how a Healthcare IAM Roadmap can set your organization on the path to a successful Identity Management implementation. Dramatic changes are required in healthcare organizations to improve the quality of patient outcomes, increase access to care, protect privacy, and reduce costs in light of new healthcare technologies, including telemedicine and online resources supporting patient …

3 Key Considerations for Your Healthcare IAM Roadmap Read More »

identity management and cybersecurity articles

11 Must-Read Identity Management and Cybersecurity Articles

Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity articles. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos. To receive the top Identity Management and Cybersecurity articles in your inbox …

11 Must-Read Identity Management and Cybersecurity Articles Read More »

CCPA compliance

CCPA Compliance – IT’s Not a Walk in the Park

Senior privacy consultant Jodi Daniels shares what CCPA compliance means for your organization. When we think of data privacy and online security, we often think of  “IT” and how various types of software, fancy passwords, and technology updates keep our accounts and information safe. But data privacy is much more than that. Does that mean …

CCPA Compliance – IT’s Not a Walk in the Park Read More »

identity governance

Seven Goals for Identity Governance Success

Jim Marshall shares seven areas to consider when defining your Identity Governance goals and objectives. Where should you start with your Identity Governance project? Perhaps the goals have already been established by your key stakeholders. Possibly it’s a compliance initiative driven by regulations such as PCI DSS, SOX, HIPAA, or GDPR. Or you know that …

Seven Goals for Identity Governance Success Read More »

Scroll to Top