Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

Government and Cybersecurity: Conquering Secure Remote Access

COVID-19 has forced hundreds of thousands of government and public safety staff to rapidly shift from the traditional office setting to remote offices located in their homes. These employees have gone to work in the same building every day for years, often with a badge for secure building access, and essentially followed the same daily operations. But now, everything has changed.

Read More

Increasing Healthcare Security & Usability with the IAM Maturity Model

Identity and Access Management (IAM) in healthcare is designed to achieve the balance of strengthening security measures and enhancing clinical workflows through efficient access to digital tools and records— all the while meeting HIPAA and HITECH compliance.

Read More

How to Best Celebrate World Password Day: Implement Passwordless Authentication

Today is the first Thursday of May, which means it’s World Password Day. World Password Day is a timely opportunity to remind internet users to evaluate their individual password strengths and best practices. However, in reality, passwords are a significant vulnerability and even the strongest passwords can easily be stolen and compromised.

Read More

Identity Automation Releases Summer 2020 Update for RapidIdentity IAM Platform

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. We are proud to announce the latest generation of RapidIdentity and provide our customers with the most in-demand capabilities for today’s evolving IAM challenges.

Read More

Healthcare IAM: The Five Step Path to Success

Recently, we discussed how modern Identity and Access Management (IAM) enables healthcare organizations to reduce risk through security, while also enhancing usability for clinicians. However, there are many, different facets of IAM, spreading across a number of areas and processes in healthcare, and these capabilities are extensive for facilities of all sizes.

Read More

Identity Automation Launches Studio Module for RapidIdentity with Enhanced Rostering Capabilities

I’m excited to announce the launch of the Studio module for RapidIdentity with enhanced Extract, Transform, and Load (ETL) capabilities. This new module provides bidirectional ETL capabilities including the transformation, combination, and filtering of data, which has been leveraged for a complete refactoring of RapidIdentity Rostering, a data rostering solution for K12 education.

Read More

Town of Mooresville Spotlight: How to Become CJIS Compliant with RapidIdentity MFA

Nicknamed “Race City USA,” the Town of Mooresville, located in North Carolina, employs approximately 475 staff members, including police officers, firefighters, and administrators in city hall, finance, parks and recreation, and more.

Read More

Balancing Healthcare Security and Usability with Identity & Access Management

It’s no secret there are high expectations surrounding the healthcare industry, especially today with the state of emergency and fear bound to the COVID-19 Pandemic. Healthcare organizations must take even higher measures to protect patient and staff safety, deliver a high quality of care in an efficient manner, and keep patient records and information secure with adherence to compliance requirements.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part Two

Maturity models can be used to evaluate the effectiveness of current capabilities and set a prioritization level when an organization is ready to advance its capabilities. When applying a maturity model to Identity and Access Management (IAM), however, it’s important to examine the key tenets of an overall IAM strategy.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part One

Recently, we discussed the four key areas of comprehensive identity and access management (IAM) as well as the common misconception that IAM is a technology that’s confined to select areas. As we transition away from this perception to one of a robust and mature IAM system with a wide array of tenets, it’s critical to determine an action plan to improve your organization’s IAM capabilities.

Read More

Subscribe Here!