Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

Identity Automation to Present and Showcase New UI at Gartner Identity and Access Management Summit

I’m pleased to share our latest press release announcing Identity Automation is set to exhibit and present at the Gartner Identity & Access Management Summit 2019 on December 10-12 in Las Vegas, NV.

Read More

Evaluate Your Identity Governance & Administration Capabilities with the Governance Maturity Model, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part Two

Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part Two

In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.

Read More

Announcing the Latest Release of RapidIdentity: A Look at Our Identity Management Solution’s Enhanced UI and More

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. Therefore, we are pleased to announce the latest release of our RapidIdentity Identity and Access Management (IAM) solution, adding an enhanced user interface (UI), as well as new functionality and capabilities.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Cyber Attacks in Schools: It CAN Happen to Your District

With over 120,000 schools in the United States, it is easy to think that your district can hide safely in the noise or that among the pack, your schools are safe. While this mindset that cyber criminals have “bigger fish to fry” may give you some peace of mind, the facts instead point to a rise in cyber attacks targeting organizations exactly like yours.

Read More

The Six Essential Steps for GDPR Compliance in Higher Ed

The amount of coverage and attention the General Data Protection Regulation (GDPR) received leading up to May 2018 was intense to say the least. But even now, more than a year since that date has come and gone, organizations across the world are still either unsure or mistaken about whether they are compliant—and how to become so.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part One

Often times, healthcare organizations have point solutions to address critical areas, but are still concerned about their broader security needs.

Read More

Subscribe Here!