Access management

Identity Governance Access Management

9 Informative Identity Governance & Access Management Articles

Stay informed with our biweekly Identity Governance, Access Management, & Cybersecurity updates. We curate the best IAM & information security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are 9 of our favorite Identity Access Management, & Cybersecurity articles for late January/early February 2018.   90% Of Gmail Users Don’t Use This Simple Trick To […]

9 Informative Identity Governance & Access Management Articles Read More »

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 2

A three-part series examining the intricacies of integrating Role Based Access Control into a group environment. In part one of this series on integrating Role Based Access Control (RBAC), we provided a high-level overview of the necessary footwork to prepare stakeholders for the organization-wide change that comes with the territory. In this second part, we will do a

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 2 Read More »

Taking the Chaos Out of Access Control

Access security can feel like chaos. To help bring some control to the chaos, Jerry Combs, Principal Identity Architect at Idenhaus Consulting, and Kent Purdy, Solutions Marketing Manager at NetIQ, joined forces to discuss pressing access management challenges facing organizations today in “Taking Chaos Out of Access Control”. During this 54-minute webinar, Jerry and Kent

Taking the Chaos Out of Access Control Read More »

Why Process Is Essential for OT/IT Integration Success

IT/OT Integration success relies on alignment of people, process, and technology. Industrial control systems typically weren’t designed to be connected to the internet, so they weren’t built with cybersecurity capabilities to ward off hackers. –How to prevent hackers from taking down critical infrastructure, Business Insider Until recently, Operational Technology (OT) and IT departments operated completely separate

Why Process Is Essential for OT/IT Integration Success Read More »

Mastering Identity Management: A Better Process for Vendor Evaluation

Selecting a vendor for your Identity Management solution can be an overwhelming task. The market is crowded, product functionality covers a wide range of features, and the investment in both money and time is guaranteed to lock in the business for 2-3 years. If the chosen product comes up short in a key area, the

Mastering Identity Management: A Better Process for Vendor Evaluation Read More »

Scroll to Top