Category Archives: Process

How to Connect HR Processes to Identity Management, Part 1

In our previous blog Connecting Human Resource Process and Data to Identity Management, we outlined the fundamental principles of creating a smooth on/off-boarding process for employees and contractors. Wasteful and inefficient on-boarding processes cost companies time, effort, and money. They …Read More

Share

Taking the Chaos Out of Access Control

Access security can feel like chaos. To help bring some control to the chaos, Jerry Combs, Principal Identity Architect at Idenhaus Consulting, and Kent Purdy, Solutions Marketing Manager at NetIQ, joined forces to discuss pressing access management challenges facing organizations …Read More

Share

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with …Read More

Share

A Fresh Approach to Cybersecurity, Part 3

This series, What is Cybersecurity?, outlines the basic tenets of how the three areas of the cybersecurity triangle may be implemented by an organization. The cybersecurity triangle (people, process, technology) has been the focus of the series, as it provides …Read More

Share

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according …Read More

Share

Core Identity & Access Management Use Cases

Here is a reference list of common Identity Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee Hire through Automated HR Feed New contractor hire (workflow, database, or system feed) …Read More

Share