The Top Data Challenges Facing Your IAM Implementation, Data Series Part 2

In part one of our series on data, we discussed how data is the lifeblood of any IAM system. To recap, IAM systems manage the authentication and access of users to organizational systems, applications, and resources. Each user has an account that’s used to log into different applications and systems. Depending on who a user is and his or her attributes, the IAM system determines what the user has access to and what he or she can do within those systems.  

Read More

Why IAM Should Be a Foundation for Your AWS Migration

As cloud technologies and services become increasingly pervasive, accepted, and economically compelling, it’s no longer a matter of “if”, but when to migrate. However, an equally important question is how to migrate! And more and more, companies are moving some or all of their infrastructure to Amazon Web Services (AWS) in order to realize lower capital costs and total cost of ownership, elastic scalability, and high availability at a global scale.

Read More

The Importance of Good Data in Any IAM Implementation, Data Series Part 1

Data is the lifeblood of any Identity and Access Management (IAM) system. It can make or break an implementation. Complete and accurate data empowers your organization to provide users with an unbelievable set of tools that increase security, improve business processes, and reduce risk.  

Read More

Our Top IAM Blog Posts for Education in 2017

Last week, we released our top five most popular Enterprise IAM Blogs from 2017. This week, we want to take a look back at some of our favorite higher education and K12 education-related content. From ransomware, to managing transient users, to student data privacy, we’ve covered a wide range of key topics in the industry.

Read More

Buying Identity Management: Single Vendor Platform or Multi-Vendor Point Products? Part 3

When selecting a solution for your organization, you may find yourself weighing the merits of point solutions versus a single platform. In part 1 of this series, two considerations were weighed: procurement effort and implementation difficulty. In part 2, we discussed integration complexity. This post will cover five long-term factors you should consider. 

Read More

Our Top Enterprise IAM Blogs in 2017


Another year, another look back at our top blogs! 2017 produced our our most read blog to-date, RBAC vs ABAC Access Control Models - IAM Explained. And from common Multi-Factor Authentication (MFA) terms and factor types to the top challenges and benefits, we also saw great readership on many of our MFA-related articles.

Read More

New RapidIdentity Product Capabilities Released in Fall 2017


At Identity Automation, we are continuously releasing new product capabilities for our RapidIdentity Identity and Access Management (IAM) solution. We’ve had a few releases this fall and wanted to make our customers aware of key capabilities that have been released over the past several months.

 

Read More

The Inherent Risks of Remote Third-Party Access

Businesses today are increasingly reliant on third parties, such as contractors, contingent workers, and vendors. And while these third parties enable organizations to decrease operational costs and increase productivity and agility, it also means greater numbers of external users need remote access to internal networks and sensitive corporate resources and data.

Read More

Meeting the DFARS MFA Requirements—What You Need to Know

As we noted in two previous blog posts, the deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) data security requirements is Dec 31, 2017.

In one post, we explained the basics of the DFARS data security rules, and in the other we explored the “14 families” of security measures outlined in National Institute for Standards and Technology Special Publication 800-171 (NIST SP 800-171). 

Read More

Subscribe Here!