Recent Posts by Kathleen Garska

 
Kathleen Garska is an experienced digital marketer and writer within the B2B and technology spaces. As Identity Automation’s Marketing Manager, she oversees the company’s digital, social, event, and blogging efforts. Beyond Marketing, her interests include art, design, travel, and cooking.

Our Top IAM Blog Posts for Education in 2017

Last week, we released our top five most popular Enterprise IAM Blogs from 2017. This week, we want to take a look back at some of our favorite higher education and K12 education-related content. From ransomware, to managing transient users, to student data privacy, we’ve covered a wide range of key topics in the industry.

Read More

Our Top Enterprise IAM Blogs in 2017


Another year, another look back at our top blogs! 2017 produced our our most read blog to-date, RBAC vs ABAC Access Control Models - IAM Explained. And from common Multi-Factor Authentication (MFA) terms and factor types to the top challenges and benefits, we also saw great readership on many of our MFA-related articles.

Read More

New RapidIdentity Product Capabilities Released in Fall 2017


At Identity Automation, we are continuously releasing new product capabilities for our RapidIdentity Identity and Access Management (IAM) solution. We’ve had a few releases this fall and wanted to make our customers aware of key capabilities that have been released over the past several months.

 

Read More

The Inherent Risks of Remote Third-Party Access

Businesses today are increasingly reliant on third parties, such as contractors, contingent workers, and vendors. And while these third parties enable organizations to decrease operational costs and increase productivity and agility, it also means greater numbers of external users need remote access to internal networks and sensitive corporate resources and data.

Read More

Common Account Username Convention Fails

Developing a single account username convention that meets all your organization's requirements and will work for both current and future users? Well, that's easier said than done—much easier said than done.

Read More

Why Are Flexible Authentication Policies Important in Today's Environment?

Gone are the days of your employees working a standard nine to five from within company walls. Today, employees often work remotely—from different devices and at all hours of the day.

Read More

We’ve launched the new Identity Automation website

Identity Automation has launched our new, fully-redesigned website and we are excited to share it with you! The new site offers streamlined navigation and cleaner design that deliver direct access to the information you need.

Read More

Our Top IAM Blog Posts for Education in 2016

Earlier this week, we released the most popular blog posts in 2016 from our Enterprise Blog. So today, we wanted to do the same with our K12 and higher education blog posts. After all, we’ve covered a variety of identity and access management (IAM) topics this year on our Education blog, including unique IAM challenges in higher ed, managing contingent users, provisioning users with multiple roles, and student data rostering.

Read More

Our Top IAM Blog Posts for Enterprises in 2016

What a year 2016 has been! With 2017 fast-approaching, we’ve decided to take a look back at some of our Enterprise blog highlights from the past year. From the risks of contingent workers, to upgrading legacy systems, to privileged access management, to single-sign-on – we’ve covered a wide range of identity and access management topics in 2016.

Read More

Webinar: Your legacy IAM System is Obsolete. Now What?


Back when enterprises began adopting identity and access management (IAM) solutions, like the one you might be using now, the focus was on passing compliance audits. However, the times have changed and so have the business and threat landscapes.

Read More

Subscribe Here!