Identity Automation Blog

Recent Posts by Troy Moreland

 
Troy Moreland is a world-class expert technologist in the field of identity and access management. He has more than 20 years of relevant experience, including his leading efforts to select, design, and deploy one of the first commercially successful identity management implementations in the United States. Since Identity Automation’s founding, Troy has architected, designed, and implemented identity management solutions for hundreds of organizations including Adobe, CarQuest, Hunter Douglas, eBay, TDBank, Health Canada, Lowe’s, Overstock.com, MD Anderson Cancer Center, Kansas University, State of Texas, State of North Carolina, and many more.
Find me on:

Announcing RapidIdentity 3.3

At Identity Automation, we bet big on user experience from day one. We started with the premise of UI designs for new self-service and delegation tools. During our early days, I had worked with numerous vendor products, all of which I felt were overly complicated and more constrained than they needed to be. Since then we have continued to innovate. 

Built with the future of user experience in mind, today we released RapidIdentity 3.3, which includes some exciting new feature additions to RapidIdentity

Read More

Don't Allow a Lazy!

At the end of April we published a couple pieces of content focused on rogue employees, a security threat facing nearly every company in the world. Rogue employees are those fully vetted users inside your company who probably have no malicious intent to cause harm, but end up doing so regardless, for a variety of reasons ranging from laziness to oversights to hoarding access.

Read More

Learnings from EiC 2015 by KuppingerCole

A few weeks ago, James Litton and I touched down in Munich to speak at Kuppingercole's European Identity & Cloud Conference 2015, where we also had the pleasure of speaking with innovation leaders shaping the future of IT. I wanted to share some of my thoughts and observations from the event:

Read More

Next Week, Interop 2015 in Las Vegas!

Our team is gearing up for Interop 2015 in Las Vegas next week and we’re excited to be part of a great event! What we’re looking forward to the most is helping you find new ways to address your current IT headaches and plan for the future. 

Read More

How To Handle High Ranking Access Hoarders

Internal security vulnerabilities are the most likely ‘attacks’ a business faces. Many of the biggest attacks actually originate from inside your enterprise and come from fully authenticated users - your employees. Some of these intrusions stem from employees bypassing security standards, while others are caused by employees who may not know the security standards. But the threat we’re seeing more and more is the employee we refer to as the access hoarder.

Read More

Is Access Certification Still Necessary?

Are you using access certification to remove access once it’s no longer needed? Do you find the access certification process to be inefficient and tedious?

Read More

The Overlooked Nature of Internal Security Vulnerabilities

Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.

Read More

User Account Naming Conventions

In every identity project the topic of user account naming conventions comes up. We have seen just about every convention possible. More often than not, environments have more than one convention because over time they changed the convention but grandfathered in the existing accounts. Inevitably I’m asked, “What is the best user account naming convention for us to use?”

Read More

What does SSO mean to you?

When we meet with a customer, we first like to build a common ground with regards to nomenclature. In the identity management field this is especially true because terms are used differently by different people/organizations. We find this to be especially true with discussions around the topic of SSO (Single Sign-On).

Read More

BYOD The Good, The Bad and The Ugly

Today I read an article in NetworkWorld entitled “BYOD early adopters cite sticker shock”. I have discussed BYOD with many of our customers and, personally, I can’t buy into it. To explain, here is my take on BYOD, the good, the bad and the ugly.

Read More

Subscribe Here!