This year has flown by, and we are excited to see what 2020 will bring! Before we look ahead, we’d like to take a look back at 2019. So, we’ve compiled a list of our top five Identity and Access Management (IAM) blog articles from 2019 just for you.
After reviewing this year’s blogs, it’s clear: our IAM Maturity Model was king when it came to content, and many of our top blogs revolved around the maturity model and its seven IAM tenets. However, from M&As to a passwordless future, it wasn’t the only topic on our mind.
Check our top posts out for yourself, and enjoy the look back!
So your company is buying a company…This is undoubtedly a huge step forward for your organization and a reason for celebration, but if you’re part of the IT department, you might be more focused on the long list of important tasks to be done immediately after the contract is signed. Your organization will suddenly become responsible for all aspects of operations ...Read More
Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenants, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move ...Read More
Recently, Identity Automation CEO, James Litton was featured in a USA Today article that posed the question: Is Single Sign-On (SSO) the answer to our password-related struggles? The article looks at the examples of Google, Apple, and Facebook rolling out their own SSO features and explores Google product manager Mark Risher’s perspective that focus shouldn’t be put on making passwords more challenging ...Read more
4) Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part 1
By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. In fact, according to the 2017 Verizon Data Breach Report, over 80% of hacking related breaches are due to weak or stolen passwords ...Read More
One of the most powerful tenants of any modern Identity and Access Management (IAM) system, and arguably a necessary foundational layer from a security perspective, is Identity Lifecycle Management (ILM). ILM refers to the actual creation and management of user identities, taking appropriate actions for any changes, as well as the removal of identities across all the services and applications ...Read More
Like what you read? Want to read more? Subscribe today to stay up-to-date in 2020!