Identity Automation Blog

Stay up to date with all of the latest news and events.

Greg Pearson has over 20 years of experience in information technology in various industries, working in multiple roles within IT, including executive management, consulting, security, architecture, development, support, and business analysis. He has held leadership positions in companies ranging from smaller, startup organizations to large, global Fortune 50 companies. For the past seven years, Greg has been with Identity Automation as one of the foremost experts in identity and access management, and has utilized his expertise to implement IAM solutions for hundreds of customers. Greg holds multiple technical and security certifications, as well as a BBA and MBA in Business Management.

I recently presented at the 2nd Annual ISACA Cybersecurity Conference in Houston, TX, held by the Information Systems Audit and Control Association (ISACA), a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance. Other presenters revealed some new, interesting ways to protect organizations from security threats, and as always, conversations other attendees proved enlightening. This year, they gave me some insight into reasons why people don’t have more effective security systems.

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Many of our customers have found that as the number of critical applications and services increases in their environment, so does the need to deliver them to their users continuously. Additionally, users are demanding more out of the applications, wanting customized views, dynamic data, and ad-hoc reporting. These requirements are putting additional stress on the web servers and application infrastructure. Often, web or application servers become overly taxed, and appear non-responsive to the users.