Recent Posts by James Litton

With more than 29 years of experience in enterprise technology software and systems, James has led teams as an executive living and working in North America, Africa, Europe, and throughout the Asia-Pacific region. Immediately prior to joining IA, he was the Head of IT for Cray, a global supercomputing company. James joined Identity Automation as its Chief Executive Officer in 2007 and led the company to success as a consulting services firm and has since guided the company through its rapid and successful transformation into the highly profitable, high-growth software products company it is today.

User Identity vs. Device Identity

Last week, I wrote a post about how with the proliferation of the Internet of Things, “things” within an organization - those smart connected devices that are able to think on their own - will emerge as insider threats in the future. At the end of that post, I said that things will eventually become another identity we will have to secure and manage.

Read More

“Things” as Insider Threats

In the past, we’ve talked a lot about
rogue employees and how they pose an internal threat to organizations if their identities aren’t properly managed. Last month, Troy discussed them again, building on our rogue employee archetypes by adding a few others to the list.

Yet as the Internet of Things continues to grow from a concept into something more tangible, I can’t help but think that “things” could eventually pose an internal threat to organizations as well.

Read More

IoT Affects the Enterprise Too

The Internet of Things (IoT) has become a very popular topic with the media and bloggers over the past few years. When it’s discussed, it’s typically in association with consumer devices, an aspect I never gave much thought to until last week when I was discussing the 2013 Target breach, and this post from Brian Krebs in particular, with a colleague.

Read More

The Internet of Insecurity: How IoT Puts Information at Risk

To say that the Internet of Things (IoT) has been a hot topic lately would be an understatement. Over the last few years, talk about IoT has rocketed from zero to a hundred, and has created a growing number of eager early adopters who want to take shiny, new IoT devices home with them right now. At the same time, some businesses have already started dipping their toes into the IoT lake. However, like many technologies ahead of their time, the increase in the number of IoT devices is quickly outpaced by the number of ways they can be breached by cyber criminals.

Read More

North Carolina Department of Public Instruction Completes Roll-Out of Identity Automation

A few years ago, North Carolina’s Department of Public Instruction (NCDPI) selected Identity Automation to build a cloud identity platform to manage all its users in all its public schools. Each student, teacher, staff member and administrator at every K-12 public school would be using the platform to access all the state provided applications and programs they needed to use on a daily basis.

Read More

Supporting a Modern Ed Tech Program in ESEA

Digital tools are as critical to student learning today as pen and paper ​have been in the past. We at Identity Automation support the addition of the Enhancing Education Through Technology ​bill ​to the Elementary and Secondary Education Act​ (ESEA)​.​ This bill would ensure a dedicated and well-funded tech program would be part of the revised ESEA.​ The​ effort ​to make this revision ​is currently led by Senator Tammy Baldwin (D-WI) and Senator Lamar Alexander (R-TN) and is up for a vote later this afternoon. 

Read More

Identity Automation Is a Proud Signatory of the Student Privacy Pledge

Joining over 100 corporations including Apple, Google, Khan Academy, and Microsoft, we are pleased to support Student Privacy Pledge in their mission to safeguard the privacy of students in grades K through 12.

Read More

Automating Access Controls

Identity Lifecycle Management is a function that occurs in all organizations but is usually a manual process at best. Many organizations are being driven to implement processes to automatically curtail user access based on their role within the organization and to automatically revoke that access upon termination.

Read More

Password Self Service in a Down Economy

We have all heard the stories about businesses struggling to stay viable as we deal with the current economic slump. A topic that has been of particular interest to many of our existing and prospective customers in recent months has therefore been cost reduction. While the Identity Management space covers a lot of ground, one particular area that can have a big impact on cost is Password Self Service.

Read More

Five Reasons Why You Need An IDM Solution

Today's enterprise is more complex than ever before. The pressure on Information Technology departments to manage their technology resources to meet the current organizational needs all the while scaling to meet its future needs is tremendous.

Read More

Subscribe Here!