Process

process-analysis

4 Key Benefits of Process Analysis in Identity Management

Identity Management implementations are typically thought of as a technology project. This couldn’t be farther from the truth. The broad scope of Identity Management solutions requires business-wide changes to HR processes, security policies, and provisioning processes. They greatly impact how the processes and technology will work together. Investing a mere 10 percent of your time upfront on …

4 Key Benefits of Process Analysis in Identity Management Read More »

process-map

7 Things that Successful Process Mapping Should Reveal

Onboarding workers is one of the most complex processes that impact Identity Management implementations and the end-user experience. Completing the hiring process, creating the user’s IT accounts, setting up payroll and benefits, issuing security badges, and building a workstation are all part of worker onboarding. When there are many activities that have to come together …

7 Things that Successful Process Mapping Should Reveal Read More »

automate_onboard

Why IDM is the Secret to Creating the Onboarding of the Future

Automation is the key to making the onboarding process—a critical business process—work for your organization. But how do you decide what parts of the process are worth the effort to automate? You start by making a list of the critical elements—access rights and assets—that employees and contractors need to start work. Not all departments will agree …

Why IDM is the Secret to Creating the Onboarding of the Future Read More »

How to Connect HR Processes to Identity Management, Part 1

In our previous blog Connecting Human Resource Process and Data to Identity Management, we outlined the fundamental principles of creating a smooth on/off-boarding process for employees and contractors. Wasteful and inefficient on-boarding processes cost companies time, effort, and money. They also cost employee goodwill; employees come to despise processes that don’t work or that don’t …

How to Connect HR Processes to Identity Management, Part 1 Read More »

Taking the Chaos Out of Access Control

Access security can feel like chaos. To help bring some control to the chaos, Jerry Combs, Principal Identity Architect at Idenhaus Consulting, and Kent Purdy, Solutions Marketing Manager at NetIQ, joined forces to discuss pressing access management challenges facing organizations today in Taking Chaos Out of Access Control. During this 54-minute webinar, Jerry and Kent identify …

Taking the Chaos Out of Access Control Read More »

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program …

The Secret of Successful Vulnerability Management Programs Read More »

Mastering Identity Management: A Better Process for Vendor Evaluation

Selecting a vendor for your Identity Management solution can be an overwhelming task. The market is crowded, product functionality covers a wide range of features, and the investment in both money and time is guaranteed to lock in the business for 2-3 years. If the chosen product comes up short in a key area, the …

Mastering Identity Management: A Better Process for Vendor Evaluation Read More »

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the …

Does your Identity Management Program Pass the ‘Marshmallow Test’? Read More »

A Fresh Approach to Cybersecurity, Part 3

This series, What is Cybersecurity?, outlines the basic tenets of how the three areas of the cybersecurity triangle may be implemented by an organization. The cybersecurity triangle (people, process, technology) has been the focus of the series, as it provides an easy, understandable framework for discussing what comprises cybersecurity and the areas of concentration to …

A Fresh Approach to Cybersecurity, Part 3 Read More »

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions …

Getting Started with Data Loss Prevention: 4 Best Practices Read More »

Scroll to Top