Identity Automation Blog

Recent Posts by James Litton

 
With more than 29 years of experience in enterprise technology software and systems, James has led teams as an executive living and working in North America, Africa, Europe, and throughout the Asia-Pacific region. Immediately prior to joining IA, he was the Head of IT for Cray, a global supercomputing company. James joined Identity Automation as its Chief Executive Officer in 2007 and led the company to success as a consulting services firm and has since guided the company through its rapid and successful transformation into the highly profitable, high-growth software products company it is today.

Corporate Governance is More Than a Good InfoSec Policy

*Disclaimer: This article originally appeared on IDG Connect

Over the past few years, Governance, Risk, and Compliance (GRC) have become three of the hottest topics in Information Technology circles. The growing demand for compliance with federal and state laws, as well as industry best practices, has necessitated a closer look at IT governance, as well as solutions that help to ensure an organization has invested their time and efforts wisely, through management and implementation of such technologies as access control, data protection, and identity provisioning and management. Proper design, application, and usage of these key technologies (and others) help to control necessary risk management activities and ease the efforts that are required to remediate or address areas where compliance is lacking. 

Read More

5 Signs You Need to Upgrade Your Legacy IAM

*Disclaimer: This article originally appeared in SecurityWeek

IT leadership is a constant balancing act, especially as you must look for ways to advance your department as an engine for growth rather than a cost center. Unfortunately, time and resources for revenue-stimulating, strategic IT initiatives are often in short supply, thanks to the demands of mundane, but critical, day-to-day tasks. Of the day-to-day tasks that often become major resource drains, user identity and access management (IAM) is not only one of the most crucial to get right, but can also be one of the most problematic.

Read More

Identity Automation On Pace for Record Growth in 2016


Identity Automation hit a significant milestone in Q3 this year. We are managing an additional one million users so far this year as we continue to expand into the enterprise, government, and higher education vertical markets.

Read More

6 Things Schools Can Do to Ensure Student Data Privacy

*Disclaimer: This article originally appeared in eSchool News

Student data privacy is quite a different topic from the headlines most people read concerning data breaches. It is not about malicious intruders hacking or stealing credentials to get into a system to steal corporate intellectual property or records to sell on the dark web. Student data privacy concerns, specifically, center on the misuse of personally identifiable information, known by its acronym PII.

Read More

Identity Automation Acquires 2FA, Inc. Adding Powerful Authentication Capabilities to our IAM Portfolio

I am excited to share our latest press release announcing that Identity Automation has acquired, 2FA, Inc., a cybersecurity company that specializes in multi-factor authentication and enterprise single sign-on (SSO).

Read More

Expanding Our Footprint in Q2 with RapidIdentity as a Service



In Q2 2016, our new bookings of annual recurring revenue under contract increased 139 percent year-over-year. With the quarter behind us, I thought I’d share a few accomplishments from the past few months that have contributed to this exceptional growth.

Read More

Identity Automation Allows Organizations to Manage Up to 8 Times More User Identities with Existing Hardware

As we announced in our recent press release, RapidIdentity 4.0 is now available, so I thought I’d discuss what this enhanced functionality and scalability means for our new and existing customers.

Read More

8 Steps to Limit the Security Risk of Contingent Workers

*Disclaimer: This article originally appeared in the EDUCAUSE, The Inside Line, blog series. 

In higher education as in corporate America, we're witnessing a shift in employment strategies toward increased hiring of contingent workers—employees, either full-time or part-time, hired for one year or less, with a specific end date. A January 2014 report from the House Committee on Education and the Workforce called "The Just-In-Time Professor" states that 50% of university workers are now adjunct or nontenured faculty, a substantial increase from only 20% in 1970.

Read More

A First Quarter of Growth



The end of March brought the first quarter of 2016 to a close, and as evident by the press release we distributed yesterday, it was a very strong growth period for us. I’m extremely proud of what our team accomplished over the first three months of the year.

Read More

Subscribe Here!