Developing a single account username convention that meets all your organization's requirements and will work for both current and future users? Well, that's easier said than done—much easier said than done.
Gone are the days of your employees working a standard nine to five from within company walls. Today, employees often work remotely—from different devices and at all hours of the day.
Identity Automation has launched our new, fully-redesigned website and we are excited to share it with you! The new site offers streamlined navigation and cleaner design that deliver direct access to the information you need.
Earlier this week, we released the most popular blog posts in 2016 from our Enterprise Blog. So today, we wanted to do the same with our K12 and higher education blog posts. After all, we’ve covered a variety of identity and access management (IAM) topics this year on our Education blog, including unique IAM challenges in higher ed, managing contingent users, provisioning users with multiple roles, and student data rostering.
What a year 2016 has been! With 2017 fast-approaching, we’ve decided to take a look back at some of our Enterprise blog highlights from the past year. From the risks of contingent workers, to upgrading legacy systems, to privileged access management, to single-sign-on – we’ve covered a wide range of identity and access management topics in 2016.
Back when enterprises began adopting identity and access management (IAM) solutions, like the one you might be using now, the focus was on passing compliance audits. However, the times have changed and so have the business and threat landscapes.
Did you know October is National Cybersecurity Awareness Month (NCSAM)? This annual awareness campaign was developed by the Department of Homeland Security to educate and raise awareness about cybersecurity. Each week of NCSAM has a different theme, and this week’s theme is Every Day Steps Towards Online Safety with Stop.Think.Connect.™
Cybersecurity is a shared responsibility, and Stop.Think.Connect aims to increase people's understanding of cyber threats by getting everyone, regardless of industry, corporation size, or user type, to take steps towards being more secure. In honor of this theme, we thought there’d be no better way to kick-off NCSAM than to sit down with our resident cybersecurity expert and CEO, James Litton to discuss cybersecurity trends and what organizations can do to mitigate security threats.Watch our interview with him below:
In past posts, we’ve talked about how evolving business and threat landscapes have necessitated more robust, modern, and integrated Identity and Access Management (IAM) solutions. The reality for organizations today is that the weakest link in deterring security threats, such as system breaches and data theft, are employees themselves. Whether intentionally or unintentionally, employee data leaks are startlingly common and can have devastating effects on an organization.
As you may have heard, we recently announced that we have become an Affiliate Member of the IMS Global Learning Consortium.
The OneRoster standard is a subset of the Learning Information Services standard that focuses on the school’s needs to exchange roster information and grades.
Recently, our CEO, James Litton sat down with the South Texas chapter of ISSA as part of the organization's podcast series on cybersecurity. Their conversation covered a wide range of security and identity and access management (IAM) topics, including identity and the Internet of Things, the future of passwords, contingent workers, IAM and the cloud, and much more.