Healthcare Identity and Access Management: Why It’s Time to Shift from Single Sign-On to Comprehensive IAM

In a recent blog article, we discussed the top 5 Identity and Access Management challenges the healthcare industry is facing. Evolving compliance regulations, growing M&A activity, digital transformation, ongoing financial and organizational issues, and mounting security threats are all driving the need for more comprehensive Identity and Access Management (IAM) capabilities that go well-beyond pure single sign-on (SSO) alone.

Read More

Identity Automation to Present and Showcase New UI at Gartner Identity and Access Management Summit

I’m pleased to share our latest press release announcing Identity Automation is set to exhibit and present at the Gartner Identity & Access Management Summit 2019 on December 10-12 in Las Vegas, NV.

Read More

Identity Automation Named Bronze Winner for Company of the Year in 2019 Best in Biz Awards

I’m thrilled to share our latest press release announcing Identity Automation has been recognized by the 2019 Best in Biz Awards as a bronze winner in the Company of the Year - Medium category.

Read More

Overcoming the Top 5 Healthcare Identity Management Challenges Requires More Than SSO

The healthcare industry is in a state of flux. Increasing regulations, the shift from paper-based to digital records, and pressure to reduce costs while maintaining a high level of care has given rise to a period of change and new challenges. 

Read More

Meet Our Team: Lori Kelly, Director of Customer Success

At Identity Automation, our customers at the core of everything we do. In fact, we boast a department dedicated to advocating for our customers. Our Customer Success department is driven by developing and establishing positive relationships with our customer base. This means that we do everything we can to guarantee our customers are happy and receiving value from their solution, and continue to turn to us as trusted partners on their Identity and Access Management (IAM) journey.

Read More

SSO, Passwords, and MFA: Is the Future Passwordless?

Recently, Identity Automation CEO, James Litton was featured in a USA Today article that posed the question: Is Single Sign-On (SSO) the answer to our password-related struggles?

Read More

Evaluate Your Identity Governance & Administration Capabilities with the Governance Maturity Model, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Announcing Our New CTO, Michael Webb

I’m pleased to announce our new Chief Technology Officer, Michael Webb. Michael brings 20 years of enterprise engineering experience to the table. He was drawn to our service and expertise, and he is eager to further bolster Identity Automation’s focus on quality and innovation.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part Two

Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 3 - Hacking

Cybersecurity breaches continue to plague healthcare organizations. Every month, new horror stories about patient data being compromised hit the headlines. Despite this, and the evolving regulations in healthcare, the fact remains that the industry is still behind the curve when it comes to cybersecurity.

We’ve decided to take a closer look at the top threat actions that are causing these healthcare data breaches and how a modern identity and access management (IAM) solution can help. So far in our series, we’ve covered social engineering and malware attacks

Read More

Subscribe Here!