Announcing Our New CTO, Michael Webb

I’m pleased to announce our new Chief Technology Officer, Michael Webb. Michael brings 20 years of enterprise engineering experience to the table. He was drawn to our service and expertise, and he is eager to further bolster Identity Automation’s focus on quality and innovation.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part Two

Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 3 - Hacking

Cybersecurity breaches continue to plague healthcare organizations. Every month, new horror stories about patient data being compromised hit the headlines. Despite this, and the evolving regulations in healthcare, the fact remains that the industry is still behind the curve when it comes to cybersecurity.

We’ve decided to take a closer look at the top threat actions that are causing these healthcare data breaches and how a modern identity and access management (IAM) solution can help. So far in our series, we’ve covered social engineering and malware attacks

Read More

Capital One Data Breach Recap: Keep Your Organization Ahead of the Curve With IAM

March 23, 2019 seemed like any other Monday at Capital One headquarters. Little did employees and customers know that, over the weekend, a hacker had successfully breached Capital One’s security defenses. 

As a result, more than 140,000 Social Security Numbers, 1 million Canadian Social Insurance numbers, and over 80,000 pieces of banking and credit information were stolen, along with an undisclosed number of names, addresses, credit scores, and more. 

Read More

Identity Automation Earns Honorable Mention in 2019 Gartner Magic Quadrant for IGA

I’m pleased to announce that Identity Automation was acknowledged as an Honorable Mention in Gartner’s 2019 Magic Quadrant for Identity Governance and Administration (IGA).

Read More

Meet Our Team: Thomas Loving, Cyber Security Manager

In this month’s Meet Our Team blog, we’re highlighting our Cyber Security Manager, Thomas Loving. Identity Automation wouldn’t be who we are today without an airtight security system. We pride ourselves on our ability to keep our customers and team safe from cyber threats, so it’s natural that we employ only the best to keep our data secure.

Read More

Announcing Strategic Partnership with IGEL to Deliver Secure Endpoint Devices for Healthcare

It’s my pleasure to announce a strategic partnership between Identity Automation and IGEL Technology, provider of the next-gen edge OS for cloud workspaces. Through this partnership, RapidIdentity QwickAccess secure proximity badge access solution now supports IGEL OS-powered endpoint devices for secure, high-performance clinical computing.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part Two

In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.

Read More

Announcing the Latest Release of RapidIdentity: A Look at Our Identity Management Solution’s Enhanced UI and More

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. Therefore, we are pleased to announce the latest release of our RapidIdentity Identity and Access Management (IAM) solution, adding an enhanced user interface (UI), as well as new functionality and capabilities.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Subscribe Here!