identity management

How to Connect HR Processes to Identity Management, Part 1

In our previous blog Connecting Human Resource Process and Data to Identity Management, we outlined the fundamental principles of creating a smooth on/off-boarding process for employees and contractors. Wasteful and inefficient on-boarding processes cost companies time, effort, and money. They also cost employee goodwill; employees come to despise processes that don’t work or that don’t […]

How to Connect HR Processes to Identity Management, Part 1 Read More »

Idenhaus-identity-management-RubeGoldberg_v1.1-(1)_web

Is Your Identity Management Solution a Rube Goldberg Machine?

Is your IAM solution a Rube Goldberg Machine? Rube Goldberg was a famous cartoonist known for his illustrations of machines that accomplish a very simple task in a very complicated manner. Like many IT projects, Identity Management is rife with opportunities to over-complicate the solution and formulate extremely complex designs that include all imaginable use

Is Your Identity Management Solution a Rube Goldberg Machine? Read More »

connect-hr-iam

Connecting Human Resource Process and Data to Identity Management

Identity & Access Management (IAM) was first imagined as a centralized platform that would manage user access throughout the entire employee lifecycle, from hire to separation. IAM was designed to automate routine administrative tasks like creating user accounts and giving employees application access, all in a platform that also incorporated the business’s unique rules, policies,

Connecting Human Resource Process and Data to Identity Management Read More »

How Ryder Approaches Enterprise Cyber Risk Management

Ryder does more than just lease and rent trucks. In addition to having more than 200,000 trucks on the road, the company also offers supply chain management, fleet management, and small business services. As the company’s business model has evolved, so has the role of Risk Management within the organization. At the recent Executive Risk Summit hosted

How Ryder Approaches Enterprise Cyber Risk Management Read More »

identity-iam-data-quality-idenhaus

Why Identity Management Success Depends on Good Data Quality

It has been said that IT systems are a lot like the Old Testament, lots of rules and no mercy! Identity Management solutions are no different because they process data according to defined rules that grant and revoke user access to the network and key applications. If there is bad data in the IAM system, users cannot get

Why Identity Management Success Depends on Good Data Quality Read More »

9 Informative Identity Management Articles, October 2017

Stay highly informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are 9 IAM & Cybersecurity articles to help ensure your Halloween is full of treats and not tricks.   How To Design, Choose And Implement The Right

9 Informative Identity Management Articles, October 2017 Read More »

Top Cybersecurity & Identity Management Articles, October 2017

Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are the top Cybersecurity and Access Management articles from October 2017. Equifax: Umm, actually hackers stole records of 15.2 million Brits, not

Top Cybersecurity & Identity Management Articles, October 2017 Read More »

Avoid this Crippling Multi-Factor Authentication Security Mistake

Did you know 63 percent of confirmed data breaches involved leveraging weak, stolen, or default passwords? The traditional combination of username and password to login to a system offers limited protection from hackers. In an effort to shore up security and protect sensitive data, many organizations are implementing multi-factor authentication (MFA). The idea behind MFA is

Avoid this Crippling Multi-Factor Authentication Security Mistake Read More »

RBAC role based access control

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 3

A three-part series examining the intricacies of integrating Role Based Access Control into a group environment. One of the biggest benefits of Role Based Access Control (RBAC) is that it provides a simple model to assign access rights to users based on their function or position. Further, the assignment of roles can be largely automated through an

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 3 Read More »

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 2

A three-part series examining the intricacies of integrating Role Based Access Control into a group environment. In part one of this series on integrating Role Based Access Control (RBAC), we provided a high-level overview of the necessary footwork to prepare stakeholders for the organization-wide change that comes with the territory. In this second part, we will do a

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 2 Read More »

Scroll to Top