RapidIdentity is Certified for OpenID Connect

Identity Automation supports OpenID Connect (OIDC), a modern and secure authentication protocol based on OAuth 2.0 authorization framework. Our customers can now use OIDC with RapidIdentity products and services, including Single Sign-On (SSO) and Multi-Factor Authentication (MFA).

Read More

Buying Identity Management: Single-Vendor Platform or Multi-Vendor Point Products? Part 4

Recently, we’ve been discussing what you must consider when choosing between a single identity and access management (IAM) vendor platform versus multi-vendor point products. In this final installation, we’ll take a closer look at best-of-breed and security as two final considerations and wrap it all up. 

Read More

Buying Identity Management: Single Vendor Platform or Multi-Vendor Point Products? Part 3

When selecting a solution for your organization, you may find yourself weighing the merits of point solutions versus a single platform. In part 1 of this series, two considerations were weighed: procurement effort and implementation difficulty. In part 2, we discussed integration complexity. This post will cover five long-term factors you should consider. 

Read More

Buying Identity Management: Single-Vendor Platform or Multi-Vendor Point Products? Part 2

Last week we kicked off a four-part series on evaluating a single identity and access management (IAM) platform versus using point products from multiple vendors for your security needs. The first post covered procurement effort and implementation difficulty; today, we’ll discuss integration complexity.

Read More

Buying Identity Management: Single-Vendor Platform vs Multi-Vendor Point Products—Part 1

There can be no doubt that cybersecurity threats are real and increasing in volume and complexity. Not taking a proactive stance puts your organization at high risk for a breach. According to the Verizon 2017 Data Breach Investigations Report, 62 percent of data breaches last year were the result of hacking. Of those hacking-related breaches, 81 percent were caused by stolen or compromised credentials.

Read More

Reporting with RapidIdentity, Part 1 - The Basics

This blog series will focus on reporting with RapidIdentity. Reporting performed within RapidIdentity provides a streamlined approach to obtaining meaningful identity and access management (IAM) data that helps you understand events in a contextual framework and facilitates sensible decision-making. This data can be centered on particular users, groups, or other events within an organization.

Read More

Starting, Stopping and Managing AWS Instances: Managing Infrastructure with RapidIdentity, Part VI

As more and more organizations realize the benefits of “cloud computing," the demand to host applications and services in the cloud continues to rise. Identity Automation and many of our customers have moved significant workloads into Amazon Web Services (AWS) or other cloud-hosted environments, and as a result, the need to automate and manage tasks in these environments has become more commonplace.

Amazon has provided management API’s to accommodate these needs and RapidIdentity allows customers to use them, in order to provide the same automation and “ease of use” in managing their cloud resources that they have come to rely upon for their day-to-day, on-premise IT processes.

Read More

Performing OpenVAS Vulnerability Scans: Managing Infrastructure with RapidIdentity, Part 5

In today’s digital world, information security has quickly become one of the foremost areas of concern for individuals and businesses alike. Particularly in the business realm, government regulations, such as the Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act (HIPAA), require close security auditing and penetration testing in order to ensure consumer, patient, and business data are handled securely (i.e. storage, retrieval, transmission, and authorized access).

Read More

7 Steps to Successfully Marketing Your IAM Solutions


Launching new IT initiatives is always a challenge, and the roll-out and adoption of a new identity and access management (IAM) program is no exception. While you understand how your IAM solution will better secure your organization and data and make getting work done easier, your co-workers don’t always look positively on change.

Read More

RBAC vs ABAC Access Control Models - IAM Explained



At the highest level, identity management systems are typically composed of three major elements: users, systems/applications, and policies. Policies define how the users interact with the different systems and applications.

Read More

Subscribe Here!