Identity Automation Blog

Stay up to date with all of the latest news and events.

In previous installments of this series, we discussed the emergence of Identity as a Service (IDaaS) and the benefits it offers. We also cleared up some of the most common misconceptions surrounding IDaaS. Now that you have a better understanding of the technology and its potential, let’s examine the most common IDaaS models, so that you can choose the right one for your organization.

Back when enterprises began adopting identity and access management (IAM) solutions, like the one you might be using now, the focus was on passing compliance audits. However, the times have changed and so have the business and threat landscapes.

In our last post, we discussed some of the most compelling reasons for adopting identity and access management (IAM) in the cloud. Like most other cloud services, identity as a service (IDaaS) offers cost-effective, high availability and affordable scalability. However, as you consider the possibility of moving from your legacy, on-premises IAM system to the cloud, it’s vital that you begin with a clear understanding of common misperceptions that haunt the emerging IDaaS market; here are the two biggest ones:

It’s practically a given that at least some of your IT systems and operations are in now in the cloud. In fact, 70 percent of small businesses and 90 percent of midmarket enterprises do, and the rest must begin to do so soon or risk falling behind their competition. According to Cisco, 83 percent of all data center traffic will be based in the cloud within the next three years; 2017 will see a particularly significant migration of workloads moving to cloud-based platforms, with IT modernization leading the way.

Today, I want to look at one of the ways that RapidIdentity allows administrators to automate tedious and cumbersome tasks. I’ll demonstrate a way to analyze Windows domain controllers for the presence of a specific software installation and also provide the entire RapidConnect action at the end of the post, so that you can modify it to fit your needs.

Our latest release focuses on new features that will increase the speed and security of authentication requests for young students. Additionally, we have added enhancements to RapidPortal to help organize Applications. You will also find enhancements to the Reporting functionality to make it even easier to access the information you need.

In a recent analysis of the top 1,000 global companies, 97 percent were found to have had leaked credentials that were made publicly available on the Web. While this statistic is disturbing enough by itself, what is more troublesome is how that information is captured and made public.

Many leaked credentials come as the result of an organization suffering from a data breach, but another method that attackers are using is to steal credentials from a third-party source, similar to what happened when Spotify and Pandora were attacked. In both of these incidents, corporate emails used to sign up for accounts were either published or sold. Dating and adult websites are also common places where corporate emails are inappropriately used to create accounts, resulting in more than 300,000 corporate or government worker email addresses being exposed.

When organizations start or plan to start a new IAM initiative, one of the first steps they take is some form of requirements gathering. The idea is that the requirements represent the functional and nonfunctional (IAM) needs of an organization. Then, typically through some form of procurement, the organization attempts find a solution/service/product(s) that best aligns with those requirements.

Did you know October is National Cybersecurity Awareness Month (NCSAM)? This annual awareness campaign was developed by the Department of Homeland Security to educate and raise awareness about cybersecurity. Each week of NCSAM has a different theme, and this week’s theme is Every Day Steps Towards Online Safety with Stop.Think.Connect.™

Cybersecurity is a shared responsibility, and Stop.Think.Connect aims to increase people's understanding of cyber threats by getting everyone, regardless of industry, corporation size, or user type, to take steps towards being more secure. In honor of this theme, we thought there’d be no better way to kick-off NCSAM than to sit down with our resident cybersecurity expert and CEO, James Litton to discuss cybersecurity trends and what organizations can do to mitigate security threats.

Watch our interview with him below: