Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

A Zero-Trust Approach to COVID-19: Stay Secure While Working Remotely

Conferences, music festivals, sporting events, parades— every event imaginable from coast to coast is either already cancelled, postponed, or has attendees at the edge of their seats waiting for the latest update. Hospitals and healthcare systems are sending thousands of non-essential employees home to work remotely. Universities and K-12 school districts are also shutting down all over the world, affecting 300 million students globally

Read More

Identity Automation Announces Strategic Distribution Partnership with 3Eye Technologies

I’m pleased to announce a strategic alliance with 3Eye Technologies, a value-added distributor of mobility and cloud solutions. As we continue to gain momentum through the Identity Automation 2.0 growth strategy, a targeted initiative to scale the business with increased focus on execution, the new partnership will provide new routes to accelerated profitability and deliver more value to customers.

Read More

Assessing Your Identity Governance & Administration Solution, Part Two

Time and time again, we see data breaches frequenting the headlines, and it isn’t slowing down anytime soon. In fact, 2019 alone saw two of the top five largest data breaches recorded in all time.

Read More

The IAM Security Tools That Shape a Modern Identity-Based Perimeter

As recently as five years ago, establishing strong network controls and ensuring a defense-in-depth posture was enough to minimize the risk of a cyber-attack and keep the bad actors out of your network. However, times have changed, and the delineation of organizational perimeters has blurred between on-premise and cloud-based resources as more and more users need remote access to resources and accounts.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part Two

Access Management (AM) is a critical area in any cybersecurity strategy that refers to how identities are applied to the data and resources in an organization’s environment, ensuring users have the correct access to the appropriate systems, resources, and applications.

Read More

Identity Automation Announces Strategic Partnership with Infinigate Norway

HOUSTON, TX, December 23, 2019 – Identity Automation, provider of RapidIdentity, the most complete Identity and Access Management (IAM) platform on the market, and Infinigate Norway, a premier cyber security value added distributor in Europe, the Middle East, and Africa (EMEA) and the Nordics, today announced their strategic partnership to support organizations in the Nordics.

Read More

Identity Automation Extends Support for WS-Federation and WS-Trust Protocols

I’m delighted to share our latest press release announcing our extended support for WS-Federation and WS-Trust protocols.

Read More

Identity Automation to Present and Showcase New UI at Gartner Identity and Access Management Summit

I’m pleased to share our latest press release announcing Identity Automation is set to exhibit and present at the Gartner Identity & Access Management Summit 2019 on December 10-12 in Las Vegas, NV.

Read More

Assessing Your Identity Governance & Administration Solution, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part Two

Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.

Read More

Subscribe Here!