Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

The IAM Security Tools That Shape a Modern Identity-Based Perimeter

As recently as five years ago, establishing strong network controls and ensuring a defense-in-depth posture was enough to minimize the risk of a cyber-attack and keep the bad actors out of your network. However, times have changed, and the delineation of organizational perimeters has blurred between on-premise and cloud-based resources as more and more users need remote access to resources and accounts.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part Two

Access Management (AM) is a critical area in any cybersecurity strategy that refers to how identities are applied to the data and resources in an organization’s environment, ensuring users have the correct access to the appropriate systems, resources, and applications.

Read More

Identity Automation Announces Strategic Partnership with Infinigate Norway

HOUSTON, TX, December 23, 2019 – Identity Automation, provider of RapidIdentity, the most complete Identity and Access Management (IAM) platform on the market, and Infinigate Norway, a premier cyber security value added distributor in Europe, the Middle East, and Africa (EMEA) and the Nordics, today announced their strategic partnership to support organizations in the Nordics.

Read More

Identity Automation Extends Support for WS-Federation and WS-Trust Protocols

I’m delighted to share our latest press release announcing our extended support for WS-Federation and WS-Trust protocols.

Read More

Identity Automation to Present and Showcase New UI at Gartner Identity and Access Management Summit

I’m pleased to share our latest press release announcing Identity Automation is set to exhibit and present at the Gartner Identity & Access Management Summit 2019 on December 10-12 in Las Vegas, NV.

Read More

Evaluate Your Identity Governance & Administration Capabilities with the Governance Maturity Model, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part Two

Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part Two

In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.

Read More

Announcing the Latest Release of RapidIdentity: A Look at Our Identity Management Solution’s Enhanced UI and More

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. Therefore, we are pleased to announce the latest release of our RapidIdentity Identity and Access Management (IAM) solution, adding an enhanced user interface (UI), as well as new functionality and capabilities.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part One

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Subscribe Here!