HRIS

Idenhaus Biweekly: Data Governance, Privileged Identity, Healthcare IT

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here or the …

Idenhaus Biweekly: Data Governance, Privileged Identity, Healthcare IT Read More »

Identity-Access-Management_Idenhaus-Consulting_header

5 Must-Read Identity Access Management Articles, February 2018

Did you miss yesterday’s newsletter? Stay informed with the Idenhaus biweekly Identity Management & Cybersecurity digest. We curate the best IAM, IGA, IDM, IoT, & infosec articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are our favorite Access Management & Cybersecurity articles for February 2018. CISOs: What you can control – and what …

5 Must-Read Identity Access Management Articles, February 2018 Read More »

Mastering Identity Management: When Your HRIS System Falls Short

Identity Management (IAM) is built around the concept of establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively maintained, and 3) available. In IAM, answering the question “Who are you?” depends on having access to the most current information for each user (employee or contractor) on the network. Usually, …

Mastering Identity Management: When Your HRIS System Falls Short Read More »

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer

Stakeholders are an important asset and are critical to the success of your Identity and Access Management program. Few IT projects have such far-reaching scope as Identity Management (IAM) engagements, touching stakeholders across all business domains. The breadth of IAM’s reach is also its downfall – with new requirements springing up like mushrooms after a …

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data …

Part IV –Good Data Quality drives better Identity Management Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations …

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Part II – The 5 Dimensions of Data Quality

Data quality is a term that refers to the reliability and validity of user-level data collected in the Authoritative Systems that feed your Identity and Access Management system (IAM). Quality is measured by how accurately the user data in the system reflects actual information available in the real world. In Part I of this series, we …

Part II – The 5 Dimensions of Data Quality Read More »

Part I – Data Quality is the lifeblood of Identity Management (IAM)

At most large enterprises, the IT environment has evolved over decades into an “accidental architecture” with everything from mainframes, PCs, and LANs to the Internet, cloud, and mobile devices, all connected by a poorly tied together patchwork that limits speed, flexibility, and innovation. IAM offers a new model for managing users and devices within the …

Part I – Data Quality is the lifeblood of Identity Management (IAM) Read More »

Taking the pain out of User Onboarding with IAM

When a new employee is hired, setting up access to all files, applications, databases and so on is fundamental, because users cannot do anything without it.  And while you’re at it, don’t forget arranging for parking passes, cardkey access, and permissions to enter certain areas of the building. In short, there is a lot that …

Taking the pain out of User Onboarding with IAM Read More »

Scroll to Top