Delegated Administration of User Accounts Part 3 - The Delegation Model

We recently wrote about delegated administration, a powerful Identity and Access Management (IAM) system feature and how it gives organizations the ability to assign control of of activities directly to business managers and system owners, as well as some common use case scenarios.

Read More

Delegated Administration of User Accounts Part 2 - Delegation Examples

In part 1 of our delegated administration blog series, we discussed how delegation is an Identity and Access Management (IAM) system feature that gives authorized individuals or groups of users the ability to view another user’s data and take some form of action on that user's account.

Read More

Delegated Administration of User Accounts, Part 1

One of the most powerful features of any modern Identity and Access Management (IAM) system is delegated administration and management of users. With delegated administration, organizations can reassign control of identity management activities, such new account creation, role and group assignment, and access requests from the IT team to non-IT employees, such as business managers.

Read More

How and Where You Should Be Investing for Cybersecurity

It’s a new year and it’s time to figure out what purchases, projects, and services your organization will need in the near future. No doubt, your wish list will far exceed your budget.

To meet your security needs within a budget, make sure you are investing enough in IT security by shoring up your identity and access management (IAM) program. In order to truly enable your business, you must first embrace security, and that means putting IAM at the core of your security program.

Read More

Data Best Practices to Follow for a Successful IAM Implementation, Data Series Part 3

Data is found at every point in the process and just about everything inside of the IAM systems relies on that data. While we might sound like a broken record, the better shape your data is in, the more successful (and easier, faster, cheaper, and less painful) your IAM implementation and ongoing operations will be.

Read More

The Top Data Challenges Facing Your IAM Implementation, Data Series Part 2

In part one of our series on data, we discussed how data is the lifeblood of any IAM system. To recap, IAM systems manage the authentication and access of users to organizational systems, applications, and resources. Each user has an account that’s used to log into different applications and systems. Depending on who a user is and his or her attributes, the IAM system determines what the user has access to and what he or she can do within those systems.  

Read More

The Importance of Good Data in Any IAM Implementation, Data Series Part 1

Data is the lifeblood of any Identity and Access Management (IAM) system. It can make or break an implementation. Complete and accurate data empowers your organization to provide users with an unbelievable set of tools that increase security, improve business processes, and reduce risk.  

Read More

Why You Need to Immediately Cut Data Access When Employees Leave



When your company parts ways with employees, are you able to immediately terminate all access to corporate data? If not, you’re opening the organization up to a very real danger.

Read More

Can Investing in IAM Save My Institution Money?


While the country as a whole has had more than seven years of recovery time since the Great Recession, many government agencies and institutions still find themselves struggling to fully mend. Across the U.S., many are still working to do more with less—a reality that is particularly true in public colleges and universities.

Read More

Why Most Identity Management Software Can’t Handle Transient Users at Scale


While every business faces some level of transience in its operations—namely employee or customer churn—community colleges, by the nature of their business, face the issue on a massive scale. For example, At Lone Star College, the nation’s third-largest higher-education system, up to 40 percent of the schools’ 100,000 students are transient users.

Read More

Subscribe Here!