Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

How to Best Celebrate World Password Day: Implement Passwordless Authentication

Today is the first Thursday of May, which means it’s World Password Day. World Password Day is a timely opportunity to remind internet users to evaluate their individual password strengths and best practices. However, in reality, passwords are a significant vulnerability and even the strongest passwords can easily be stolen and compromised.

Read More

Meet Our Team: Brandon Levine, Manager of Sales Development

From 2009 to today, Identity Automation has provided the market’s most complete Identity and Access Management (IAM) platform. Our hardworking Sales Development Representative (SDR) team makes sure that our solutions are top in prospective customer’s minds. 

Read More

Identity Automation Releases Summer 2020 Update for RapidIdentity IAM Platform

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. We are proud to announce the latest generation of RapidIdentity and provide our customers with the most in-demand capabilities for today’s evolving IAM challenges.

Read More

Healthcare IAM: The Five Step Path to Success

Recently, we discussed how modern Identity and Access Management (IAM) enables healthcare organizations to reduce risk through security, while also enhancing usability for clinicians. However, there are many, different facets of IAM, spreading across a number of areas and processes in healthcare, and these capabilities are extensive for facilities of all sizes.

Read More

SB 820 & COVID-19: Why MFA Must Be Part of Cybersecurity for Schools

While there is no user group that is safe from data breaches, K-12 is particularly vulnerable right now. In North Dakota alone, the state network used by K-12 schools, state universities, and other public agencies experience 5.7 known cyberattacks every month. Data breaches are not uncommon, and districts are limited in the measures they can take due to budget constraints.

Read More

Identity Automation Launches Studio Module for RapidIdentity with Enhanced Rostering Capabilities

I’m excited to announce the launch of the Studio module for RapidIdentity with enhanced Extract, Transform, and Load (ETL) capabilities. This new module provides bidirectional ETL capabilities including the transformation, combination, and filtering of data, which has been leveraged for a complete refactoring of RapidIdentity Rostering, a data rostering solution for K12 education.

Read More

Town of Mooresville Spotlight: How to Become CJIS Compliant with RapidIdentity MFA

Nicknamed “Race City USA,” the Town of Mooresville, located in North Carolina, employs approximately 475 staff members, including police officers, firefighters, and administrators in city hall, finance, parks and recreation, and more.

Read More

Meet Our Team: Greg Pearson, Director of Solutions Engineering

At Identity Automation, we work hard every day to provide best-in-class solutions that are configurable, flexible, and scalable. Working to coach our employees and customers on our products and services is our Director of Solutions Engineering, Greg Pearson. 

Read More

Balancing Healthcare Security and Usability with Identity & Access Management

It’s no secret there are high expectations surrounding the healthcare industry, especially today with the state of emergency and fear bound to the COVID-19 Pandemic. Healthcare organizations must take even higher measures to protect patient and staff safety, deliver a high quality of care in an efficient manner, and keep patient records and information secure with adherence to compliance requirements.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part Two

Maturity models can be used to evaluate the effectiveness of current capabilities and set a prioritization level when an organization is ready to advance its capabilities. When applying a maturity model to Identity and Access Management (IAM), however, it’s important to examine the key tenets of an overall IAM strategy.

Read More

Subscribe Here!