Meet Our Team: Dave Carlson, Director of Channel Sales

Dave Carlson, our Director of Channel Sales, is eight months into his tenure here at Identity Automation. Already, he’s immersed himself in several projects, which will directly impact the future of the company.

Coming to us with substantial experience in business development and global alliances, Dave has spent his career utilizing an impressive array of technical skills, a talent for sales and relationship building, and an ability to resolve difficult client situations and large technical problems.

Read More

Two-Factor Authentication (2FA) Explained: Push Notifications

More and more, organizations are looking for cost-effective alternatives to traditional passwords that increase security without affecting usability. Many people believe that push notification authentication, a newer mobile-based authentication method, could be the answer.

Read More

Two-Factor Authentication (2FA) Explained: RFID Access Control

Historically, magnetic stripe cards were used for access control. However, these cards aren’t particularly secure, as the information stored on them is typically not encrypted. Additionally, they have to be physically swiped, leading to issues with wear and tear.

Read More

Two-Factor Authentication (2FA) Explained: 2D Barcode Authentication

As part of our 2FA Explained series, we recently looked at magnetic stripe cards. Another authentication method that has long been in use and can be printed onto cards are 2D barcodes.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 2

In Part 1 of this series, we discussed the challenges that come with onboarding employees and granting access, specifically determining which permissions to give an employee, providing employees with day one access, and managing ad-hoc access requests.

Read More

Two-Factor Authentication (2FA) Explained: Magnetic Stripe Card

Today, there are many card-based options for controlling physical and network access. Although many organizations have transitioned to newer, more secure options, such as smart cards and RFID cards, others still have  magnetic stripe cards in place.

Read More

Meet Our Team: Melissa Bayless, Manager of Support Engineering

From managing global IT operations and large-scale projects to successfully revamping teams and systems for organizations with struggling IT departments, Melissa Bayless brings an extensive array of IT experience to Identity Automation. And we’re glad to have her on the team!

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 1

Identity lifecycle management presents a number of challenges: You need to quickly onboard employees so that they have access to the applications needed to do their jobs, you need to immediately offboard them when they leave the organization so they’re not a security threat, and you need to ensure IT isn’t bogged down with all changes in between as employees shift roles, get promoted, change locations, and so on.

Read More

Two-Factor Authentication (2FA) Explained: Social Login

Companies and end-users alike are constantly looking for authentication methods that lower barriers to entry and improve user experience without compromising security.

Read More

Healthcare Cybersecurity and the Human Factor: Using Risk-Based Authentication that Considers Behavioral Factors

In the healthcare industry, a lot of energy goes into driving practitioner efficiency and making patient data easier for clinicians to access. But is enough focus being put on security and protecting patient data?

News headlines indicate the answer is a resounding no. There have been a slew of notable healthcare breaches in recent years.

Read More

Subscribe Here!