Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

gartner iam summit 2019

Highlights from Gartner IAM Summit 2019 #GartnerIAM

Last week, the Idenhaus team joined almost 2,000 Identity and Access Management experts, vendors, and practitioners at the annual Gartner IAM Summit in Las Vegas. This is our third year attending the event and, as always, we found immense value in the educational tracks and networking opportunities. This year’s conference theme was “Keys to IAM …

Highlights from Gartner IAM Summit 2019 #GartnerIAM Read More »

Identity-Management-biweekly

10 Must-Read IAM and Healthcare Cybersecurity Articles

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare Cybersecurity, Data Governance, Infosecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos. To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 …

10 Must-Read IAM and Healthcare Cybersecurity Articles Read More »

Identity Management Managing User Access Across the Worker Lifecycle

Identity Management: Managing User Access Across the Worker Lifecycle

Nicole Keaton Hart and Hanno Ekdahl discuss managing user access across the worker lifecycle.  While many organizations focus on tapping into the power of Identity Management during the onboarding and creation of a worker, they frequently overlook the complexity of managing user access when a worker makes lateral moves across the organization. In this video, …

Identity Management: Managing User Access Across the Worker Lifecycle Read More »

Updating a Healthcare IAM Program? Avoid These 3 Common Mistakes

Updating a Healthcare IAM Program? Avoid These 3 Common Mistakes

Identity and Access Management (IAM) is a key component in securing any healthcare organization’s data and systems. Healthcare IAM programs do more than provide user access management across a provider’s digital environments, they provide a framework to control, audit, and enforce security at a granular level. A well-executed IAM solution seamlessly merges technologies and supports …

Updating a Healthcare IAM Program? Avoid These 3 Common Mistakes Read More »

Identity Management Biweekly: 8 Cybersecurity and Healthcare IT Articles

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Data Governance, Cybersecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos. To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 …

Identity Management Biweekly: 8 Cybersecurity and Healthcare IT Articles Read More »

Understanding Common IDM Implementation Pitfalls

Understanding Common IDM Implementation Pitfalls

Hanno Ekdahl shares common IDM Implementation Pitfalls that organizations should avoid if they want a successful IDM launch, the first time around.   Did you know that over 50 percent of IDM projects fail the first time around? While Identity Management solutions offer a large range of benefits for organizations, the implementation of these solutions …

Understanding Common IDM Implementation Pitfalls Read More »

cybersecurity and iam articles

7 Must-Read Cybersecurity and IAM Articles, October 2019

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every two weeks, we curate a selection of informative IGA, Data Governance, Cybersecurity and IAM articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. To receive the top Cybersecurity and IAM articles in your inbox every two …

7 Must-Read Cybersecurity and IAM Articles, October 2019 Read More »

developing an IAM Roadmap

Developing an IAM Roadmap Sets You on the Path to Success

Hanno Ekdahl discusses how developing an IAM Roadmap helps organizations mitigate risks to get IAM done right, the first time.  Developing an IAM roadmap is an important first step in helping your organization reap the full benefits of its Identity & Access Management investment, as well as driving organizational understanding and support. While many organizations …

Developing an IAM Roadmap Sets You on the Path to Success Read More »

Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here or the healthcare IT …

Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles Read More »

Identity Management Success Starts with Your Stakeholders

Stakeholder engagement is arguably the most important component of a successful Identity Management project.   Identity Management (IAM) programs often originate within the IT security function when the need arises to automate routine user administration tasks, support audit and compliance requirements, and integrate with key systems. Because of this, IAM programs are often approached as …

Identity Management Success Starts with Your Stakeholders Read More »

Scroll to Top