Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

Building a better API

This is an excellent blog on building API’s, which reminds us of the golden rule of design – keep it simple and functional! Key takeaway “Remember, building an API is easy… but designing an API that lasts – that’s the hard part.” Check out the full blog here: API Best Practices: The Wrap Up

The Identity of Things vs. Traditional IAM

Gartner has coined the term “The Identity of Things “(IDoT) as “a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device”. We like the concept, and our customer have dipped their toes in the waters and started incorporating IoT into their IAM strategies and roadmaps. Here’s …

The Identity of Things vs. Traditional IAM Read More »

Taking the pain out of User Onboarding with IAM

When a new employee is hired, setting up access to all files, applications, databases and so on is fundamental, because users cannot do anything without it.  And while you’re at it, don’t forget arranging for parking passes, cardkey access, and permissions to enter certain areas of the building. In short, there is a lot that …

Taking the pain out of User Onboarding with IAM Read More »

How do you manage non-employee identities?

We were recently asked this question, and managing Non-Employee Identities is a common challenge for organizations when implementing an Identity and Access Management (IAM) solution. We work with a wide range of clients across the Fortune 1000 and this is what we have seen: 1) 80% build a home grown web-based registration form that creates …

How do you manage non-employee identities? Read More »

Scroll to Top