Idenhaus Biweekly: IAM Roadmap, M&A Due Diligence, and Upcoming Webinars

Share on linkedin
Share on twitter
Share on facebook

idenhaus-biweekly

Thanks for reading the Idenhaus biweekly digest of insightful Identity Management, data security, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, GDPR, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

 

Why Your Organization Needs an IAM Roadmap via Idenhaus

Did you know that over half of all Identity Management projects fail the first time? And, even when they are successful, 4 out of 5 executives say they are not happy with the value of their Identity Management program.

Cybersecurity Due Diligence Results Should Always Be Dollar Quantified via SecureMerger

The technology landscape of every industry has developed along the way, to the point that M&A due diligence is considered irresponsible if it does not include a robust investigation of the target’s information security. The era of leaving cybersecurity to chance, due either to neglect or lack of skill, has passed.

Understanding the Relationship Between the GDPR and ePrivacy Directive via Varonis

In effect since 2002, the ePrivacy Directive (ePD) is focused on protecting privacy and security of personal data in electronic communications. You can think of it as a specialization of the more general EU data laws but for ISPs and cell carriers, as well as older telcos.

Why It’s Time to Replace Your On-Premises IAM with a Cloud Solution via EdTech

Cloud-based identity and access management systems provide greater savings, scalability, reliability and more must-have features for higher ed.

How San Mateo County Health leveraged IT to improve patient identity management via MedCityNews

By implementing an Enterprise Master Person Index and utilizing health information exchange technology, SMCH in California has been able to better understand when providers are co-managing an individual’s health.

E-Book: IdentityPROCESS+ The Definitive Guide to Identity Governance and Administration Best Practice Processes via Omada

With this almost 100 pages e-book on IGA best practices, organizations can map business requirements to business processes and have a solid foundation for scoping the IGA project at an early stage, thereby helping you avoid misunderstandings, secure alignment, and realize the benefits.

Mastering Identity Management: A Better Process for Vendor Evaluation  via Idenhaus

Selecting a vendor for your Identity Management solution can be an overwhelming task. If the chosen product comes up short in a key area, the impact on your organization can be profound.

GDPR: First Year in Review and Sneak Peak to the Year Ahead [Webinar] via GoToWebinar

GDPR swept the globe last after its debut in May 2018. It changed how organizations market, conduct business, process data, and created numerous new cookie banners! As GDPR celebrates its first birthday, what are the relevant lessons that businesses should learn from? We’ll also cover what companies should expect as GDPR toddles into its second year.

Role Based Access Control Best Practices [Webinar] via GoToWebinar

In this webinar on July 18, 2019, we will walk through our RBAC methodology, discuss lessons learned, and share best practices that you can employ in your organization. Space is limited!

 

Check out our previous digest of insightful Identity Governance and cybersecurity articles here: Idenhaus Biweekly: Application Shielding, Data Security, ForgeRock Recap

 


An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *