Identity Management & Cybersecurity Resources

IAM & Cybersecurity
Webinars, Case Studies,
Videos, Books,
& more!

Watch Our On-Demand Webinars

learning about policy based access control (pbac)

Learning about Policy Based Access Control (PBAC)

In this webinar, Ron Bowron (Idenhaus) and Mike Morley (PlainID) walk through the basics of Policy Based Access Control (PBAC).

Watch Now
Unlocking the Benefits of an Identity Management (IAM) Roadmap Webinar

Unlocking the Benefits of an Identity Management (IAM) Roadmap

Join Idenhaus to learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.

Watch Now
identity automation or governance

Which Comes First: Identity Automation or Governance?

When getting started with IAM, companies will need to decide whether to begin with identity automation or governance first. This webinar will explore both approaches and make a case for which should come first.

Watch Now
secure funding for your identity management program

How To Secure Funding for your Identity Management Program

If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective and to get your questions answered.

Watch Now
Identity Management-Role Based Access Control Best Practices

Identity Management: Role Based Access Control Best Practices

Join Idenhaus as we share best practices when implementing Role Based Access Control (RBAC) to help you keep your project on track and deliver the results you expect. You will learn how to deliver more value to the business.

Watch Now
GDPR-First-Year-in-Review-and-Sneak-Peak-to-the-Year-Ahead

GDPR: Year 1 in Review and Sneak Peak to Year Ahead

As GDPR celebrates its first birthday, what are the relevant lessons that businesses should learn from?
We also cover what companies should expect as GDPR toddles into its second year.

Watch Now

Idenhaus Case Studies

Idenhaus-Case Study-Bell-Powers-Ahead-IAM-Assessment

Bell Powers Ahead with IGA Assessment and Roadmap

Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul.

Bell Identity Management

Bell Takes Off with Identity Management (IGA)

Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model.

Global Brand Succeeds with Idenhaus

Global Brand Succeeds with IAM Strategy

A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies.

Major Hospital Embraces RBAC

Major Hospital Embraces Role Based Access Control

A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems.

Get Your FREE Book

"RE-IMAGINING IDENTITY MANAGEMENT IN THE DIGITAL WORLD"

by Hanno Ekdahl

This book is filled with insightful content, backed by years of experience, to  help guide you in designing, choosing, and implementing the right IAM soultion for your business.

Watch The Idenhaus Video Series On YouTube

Download Our Latest Infographic

8 Benefits of an Identity & Access Management Roadmap

Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support. Learn more in this free infographic!

Check Out Our Sound Bites

Subscribe to our IAM Security Bulletin

Our Latest Tweets

For all the emphasis on artificial intelligence and advanced data science at government agencies, the fundamental aspects of data management are too often overlooked.
https://bit.ly/2FO26S0 #AI

Load More...
Scroll to Top