Identity Management & Cybersecurity Resources
IAM & Cybersecurity
Webinars, Case Studies,
Videos, Books,
& more!
Watch Our On-Demand Webinars

Identity Management: Role Based Access Control Best Practices
Join Idenhaus as we share best practices when implementing Role Based Access Control (RBAC) to help you keep your project on track and deliver the results you expect. You will learn how to deliver more value to the business.

GDPR: Year 1 in Review and Sneak Peak to Year Ahead
As GDPR celebrates its first birthday, what are the relevant lessons that businesses should learn from?
We’ll also cover what companies should expect as GDPR toddles into its second year.

How to Effectively Use Role-Based Access Control
Organizations undertake RBAC projects to provide a better, more scalable method to manage user access; however, they struggle with the analysis and implementation. Learn how to keep your RBAC project on track.

Successfully Integrating HR Processes with IAM
IAM deployments can be complicated, involving people, processes, and technology across the entire business. Get expert insight on the best practices in process alignment for a successful IAM deployment.

Overcoming Data Quality Challenges in IAM
Many organizations experience the hidden costs of low-quality user data, which makes automating routine Identity Management and provisioning tasks difficult and drives unnecessary operational and support costs.

Identity and Access Management: Project Challenges and Recovery
This educational session will provide a high-level overview of core Identity Management functionality. It introduces concepts such as provisioning, self-service, business workflow integration, and resource connection.
Idenhaus Case Studies

Bell Powers Ahead with IGA Assessment and Roadmap
Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. The IGA assessment provided strong evidence that Bell’s legacy systems and processes were due for an overhaul. By prioritizing and presenting the business opportunities and requirements gathered during stakeholder interviews, Bell was able to convince its leadership to move forward to realize the benefits of the IGA solution.

Bell Takes Off with Identity Management (IGA)
Bell Textron, Inc. was challenged with selecting and implementing a modern IAM solution to provide new security capabilities and retire its legacy systems. This effort started with a review and re-design of Bell’s business process to provision users more effectively while supporting a sophisticated security model. This engagement impacted thousands of users, delivering a new technical platform and huge business impact. The project was awarded Textron’s Best Security Project in 2019.

Global Brand Succeeds with IAM Strategy
A global beverage company had a complex architecture with security vulnerabilities that required a large number of IT staff to manage. Idenhaus conducted a detailed analysis of the user lifecycle and processes, existing IT systems, standards, and policies. We compared the current environment to the desired end state – a single, central Identity Store to manage all users across enterprise systems – and developed a phased, strategic approach for a new identity infrastructure.

Major Hospital Embraces Role Based Access Control
A large mid-western hospital group had grown by acquisition and integration of new facilities. The resulting complex structure of hospitals, medical schools, and clinics has created a difficult environment for managing identities and access to critical clinical systems. Requesting and fulfilling access requests for critical roles is time-consuming manual work. Role Based Access Control (RBAC) offered a framework to improve user access management efficiency and effectiveness.
Get Your FREE Book
"RE-IMAGINING IDENTITY MANAGEMENT IN THE DIGITAL WORLD"
by Hanno Ekdahl
This book is filled with insightful content, backed by years of experience, to help guide you in designing, choosing, and implementing the right IAM solution for your business.
Watch The Idenhaus Video Series On YouTube
Download Our Latest Infographic
8 Benefits of an Identity & Access Management Roadmap
Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support. Learn more in this free infographic!
Subscribe to our IAM Security Bulletin
Our Latest Tweets
#GartnerIAM attendees:
What was your favorite session this year?
Who had the best swag this year?
Wow #GartnerIAM, did you show up! They had to bring in extra chairs to accommodate everyone that showed up for the @WomeninID luncheon.
Only downside: no one could see my hand raised as someone looking to hire for my CTO office through that sea of raised hands!
#IdentityIsHot https://twitter.com/NishantK/status/1204855159005663232
Hey #GartnerIAM, come to Milano 2 for the @WomeninID luncheon and hear from some amazing leaders in the #identity industry
In this video, we take a look at user access management across a worker’s lifecycle, specifically “in the middle” when workers may change departments, roles, or locations in the organization. http://bit.ly/38tD9pa