How RapidIdentity Protects Student Data & the EFF’s “Spying on Students” Report

Within every market—whether it be government, business, healthcare or education—it’s crucial that identity and access management (IAM) solutions are designed and implemented with close adherence to the latest government, regulatory, and best practice security frameworks and laws, in order to help organizations meet their compliance goals and to ensure the integrity and security of their user data.

Read More

Announcing the Latest Releases of  RapidIdentity and RapidIdentity MFA

Upgrade now for new report templates, password alternatives for Chromebooks, and remote start-ups, logins, and shutdowns.

We are very excited to announce the latest releases of RapidIdentity 4.2 and RapidIdentity MFA 4.8 (formerly 2FA ONE) and want to share the details of the new capabilities available to those who choose to upgrade.

Read More

Our Top IAM Blog Posts for Education in 2016

Earlier this week, we released the most popular blog posts in 2016 from our Enterprise Blog. So today, we wanted to do the same with our K12 and higher education blog posts. After all, we’ve covered a variety of identity and access management (IAM) topics this year on our Education blog, including unique IAM challenges in higher ed, managing contingent users, provisioning users with multiple roles, and student data rostering.

Read More

Our Top IAM Blog Posts for Enterprises in 2016

What a year 2016 has been! With 2017 fast-approaching, we’ve decided to take a look back at some of our Enterprise blog highlights from the past year. From the risks of contingent workers, to upgrading legacy systems, to privileged access management, to single-sign-on – we’ve covered a wide range of identity and access management topics in 2016.

Read More

5 Signs You Need to Upgrade Your Legacy IAM

*Disclaimer: This article originally appeared in SecurityWeek

IT leadership is a constant balancing act, especially as you must look for ways to advance your department as an engine for growth rather than a cost center. Unfortunately, time and resources for revenue-stimulating, strategic IT initiatives are often in short supply, thanks to the demands of mundane, but critical, day-to-day tasks. Of the day-to-day tasks that often become major resource drains, user identity and access management (IAM) is not only one of the most crucial to get right, but can also be one of the most problematic.

Read More

Webinar: Your legacy IAM System is Obsolete. Now What?


Back when enterprises began adopting identity and access management (IAM) solutions, like the one you might be using now, the focus was on passing compliance audits. However, the times have changed and so have the business and threat landscapes.

Read More

CETPA 2016 - East Side Union HSD’s Journey to Automation, SSO Shootout, and More

This week, I’m heading to Sacramento, California for the 2016 CETPA Annual Conference. Held by the California Educational Technology Professionals Association (CETPA), the conference is attended by IT professionals from K-12 school districts throughout the state.

Read More

Identity Automation On Pace for Record Growth in 2016


Identity Automation hit a significant milestone in Q3 this year. We are managing an additional one million users so far this year as we continue to expand into the enterprise, government, and higher education vertical markets.

Read More

Announcing the Release of RapidIdentity 4.1

Our latest release focuses on new features that will increase the speed and security of authentication requests for young students. Additionally, we have added enhancements to RapidPortal to help organize Applications. You will also find enhancements to the Reporting functionality to make it even easier to access the information you need.

Read More

IAM Solutions Explained - Configuration, Customization, or Out of the Box?


When organizations start or plan to start a new IAM initiative, one of the first steps they take is some form of requirements gathering. The idea is that the requirements represent the functional and nonfunctional (IAM) needs of an organization. Then, typically through some form of procurement, the organization attempts find a solution/service/product(s) that best aligns with those requirements.

Read More

Subscribe Here!