Identity Automation Blog

Correlation Mini-Series: Identity Correlation

Correlation is a topic that’s increasingly becoming a larger part of our conversations with customers and prospects. It’s also a subject that we think will continue to get more attention in the future.

Read More

How well do you know Identity Automation?

“Build up your weaknesses until they become your strong points.” - Knute Rockne, legendary Notre Dame football coach.

Since joining Identity Automation in 2011, I’ve seen the company grow significantly and embrace major technological change. From consulting to software development and from implementation to support, we’ve evolved into what we are today - a  leader in identity and access management for education, K-12 and Higher Education.

Read More

How The Department of Defense can use identity management to protect critical information

The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.

Read More

Is Your School’s IT Department Overwhelmed? Automation Can Help

School’s back in session. With the influx of new students, returning teachers and temporary staff coming back online, requests for account creations, resource partitioning and call support elicit groans across countless IT departments.

Read More

How to Integrate Cloud Applications with Dedicated Utility Accounts

With all the cloud products and applications now available, more organizations are finding it valuable to integrate them, such as linking Salesforce.com to your accounting package so data from both can be viewed together. However, as companies integrate cloud accounts, we’ve noticed a number of them run into problems maintaining those integrations down the road. When integrating cloud accounts, you often need to choose an internal user account to create the bi-directional connections and truly link the applications. For example, if we were to connect Hubspot to Salesforce, we would need to enter a Salesforce account (username and password) into Hubspot. This process works fine until the person who owned that Salesforce account leaves the company. When that happens, the integration you previously had is now useless.

Read More

Is Biometric Authentication as Secure as We Initially Believed?

Remember when Apple introduced Touch ID for its devices? Rather than typing a numerical password, a user could program his or her fingerprint into the device to lock and unlock it. Many thought it was a very innovative approach to device security and at the time of its announcement, some believed it was a new era of device security.

Read More

Analyzing and Improving Student Privacy in Education

Privacy in education is a subject that has received significant attention recently, and we see it garnering even more attention in the future. It affects students, teachers, administrators, parents, IT staff and IT vendors. All involved tread a fine line, balancing the security issues that are vital to the operation of a school with the individual privacy rights of the actual classroom users of technology.

Read More

ISACA CyberSecurity Conference

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Read More

Learn Modern Best Practices in Identity Management - Is Your Solution Keeping Up?

Identity Automation will be hosting the second of the four webinar series with Carahsoft on Thursday, August 6. Next week’s topic will discuss some of the best practices and guidelines all schools can follow to ensure their identity management system is keeping up with the recent advances in educational technology.

Read More

Learn the Benefits of Automated Identity Access Management

Did you know that 50-60% of today’s organizations still rely on manual Identity Access Management (IAM)?

While automated IAM technologies like RapidIdentity enable administrators to automatically provision and monitor users and grant time-based access, manual IAM requires admins to manually change these factors for each individual within the organization. This system can lead to lapses in access restriction and ultimately large losses in time, money and security.

Read More

Subscribe Here!