IAM

15 Trending ICS, IAM, and Cybersecurity Articles, July 2016

Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide

15 Trending ICS, IAM, and Cybersecurity Articles, July 2016 Read More »

Identity Management Reference Guide: Key Terms and Definitions

  Identity and Access Management (IAM) programs define standard controls to ensure endpoint systems are designed, configured, and managed to preserve the confidentiality, integrity, and availability of information. Most of these controls are recognized as good practice and require minimal effort to implement, if the IAM solution is built properly. Our implementations consistently highlight a

Identity Management Reference Guide: Key Terms and Definitions Read More »

Disaster-Proof Identity Management: Start with a Strong Foundation

Can you afford to have your Identity Management project fail? If not, we have some tips to prevent your Identity & Access Management (IAM) project from going off the rails. Much like constructing a building requires a strong foundation to succeed, laying the proper groundwork will help you provide an IAM architecture that is scalable,

Disaster-Proof Identity Management: Start with a Strong Foundation Read More »

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer

Stakeholders are an important asset and are critical to the success of your Identity and Access Management program. Few IT projects have such far-reaching scope as Identity Management (IAM) engagements, touching stakeholders across all business domains. The breadth of IAM’s reach is also its downfall – with new requirements springing up like mushrooms after a

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer Read More »

10 Challenges IAM Governance Teams Help Organizations Overcome

The best Identity Management (IAM) practitioners are businesses that have adopted a formal governance structure with defined processes and practices that deliver value. Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently without compromising security or causing a compliance breach. The big pivot here is that Identity Management

10 Challenges IAM Governance Teams Help Organizations Overcome Read More »

Core Identity & Access Management Use Cases

Here is a reference list of common Identity & Access Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee through automated HR feed New Non-Employee – Internal (HR feed, workflow request, application of record) New Non-Employee – External (workflow request, application of record)  New Employee

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still

How Identity Management Cuts Costs Read More »

Mitigating the High Cost of Forgotten Passwords

Password resets comprise roughly 30% of all Help Desk calls and not only impact worker productivity, but also consume valuable IT resources from your support team. What if your associates could take charge of how they reset their passwords and eliminate unnecessary calls to the Help Desk? Password self-service based on security questions is the

Mitigating the High Cost of Forgotten Passwords Read More »

Scroll to Top