Data Quality

7 Must-Read Cybersecurity Articles, July 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Learn how to overcome common data quality problems in our upcoming webinar on July 20, 2018, at 12 …

7 Must-Read Cybersecurity Articles, July 2018 Read More »

Mastering Identity Management: The Data Quality Divide

Data quality in HRIS systems can be defined in a number of ways and will have a significant impact on how Identity and Access Management (IAM) solutions work in the organization and how data quality is managed across the IT environment. From HR or business operations perspective, data is often evaluated based on whether it …

Mastering Identity Management: The Data Quality Divide Read More »

data-identity-management

7 Must-Read Identity & Access Management Articles, June 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Many organizations experience the hidden costs of low-quality user data, which makes automating routine Identity Management …

7 Must-Read Identity & Access Management Articles, June 2018 Read More »

identity-iam-data-quality-idenhaus

Why Identity Management Success Depends on Good Data Quality

It has been said that IT systems are a lot like the Old Testament, lots of rules and no mercy! Identity Management solutions are no different because they process data according to defined rules that grant and revoke user access to the network and key applications. If there is bad data in the IAM system, users cannot get …

Why Identity Management Success Depends on Good Data Quality Read More »

Avoid this Crippling Multi-Factor Authentication Security Mistake

Did you know 63 percent of confirmed data breaches involved leveraging weak, stolen, or default passwords? The traditional combination of username and password to login to a system offers limited protection from hackers. In an effort to shore up security and protect sensitive data, many organizations are implementing multi-factor authentication (MFA). The idea behind MFA is …

Avoid this Crippling Multi-Factor Authentication Security Mistake Read More »

3 Must-Take Steps to Getting User Data Right

Maintaining data quality is the single most important principle of a functioning Identity Management solution. In fact, realizing the benefits of automated user provisioning and access management processes depends on it. Unfortunately, there is a huge performance penalty for getting the data wrong that users will not accept – putting your IAM program at risk …

3 Must-Take Steps to Getting User Data Right Read More »

Roles Definition- Part I

Defining Roles: The Top-Down Process in Practice

Our path to well-defined roles begins with the system owner who evaluates the applications and which users should have access. When he determines that a group does not belong, for example, the accounting folks should not be on a particular application or system, he removes them…All of them. This first pass eliminates users who should …

Defining Roles: The Top-Down Process in Practice Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data …

Part IV –Good Data Quality drives better Identity Management Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations …

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Scroll to Top