Identity Automation Blog

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Rostering and Identity and Access Management: Bridging the Gap Between Convenience and Security

*Disclaimer: This article originally appeared in EmergingEdTech, Administrative Solutions posts

School districts throughout the country rely on technology today more than ever before. At many districts, laptops and tablets are standard-issue equipment for students as young as second grade-level, and they must be compatible with campus networks as well as in the home.

Read More

The Unavoidable and Expanding Impact of GDPR Compliance on Higher Education

Each year, the United States hosts over a million foreign students. And for the schools they attend, this often means complying with rules and regulations that these students bring with them from their home countries. 

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Meet Our Team: Samuel Carter, Manager of Training

Identity Automation could not be where it is today without our team. Our people are the driving force behind Identity Automation’s successes, growth, and ability to adapt to the ever-changing technology landscape.

Read More

Announcing the Launch of the Identity Automation Partner Program - VIP

I’m thrilled to share our latest press release announcing the launch of the Identity Automation Partner Program - VIP as the next critical element of the Identity Automation 2.0 growth strategy, a targeted initiative to scale the business with increased focus on execution.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part One

By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. In fact, according to the 2017 Verizon Data Breach Report, over 80% of hacking related breaches are due to weak or stolen passwords.

Read More

Mergers & Acquisitions: Immediately Step Up Security with Identity and Access Management

With mergers and acquisitions (M&A) on the rise, it’s likely that your company has either experienced an M&A already or will at some point. And you're also likely aware of the herculean effort that’s required of IT staff. Suddenly, IT is knee deep in integration efforts, such as onboarding acquired employees, consolidating domains, and integrating technology stacks. Let’s face it, cybersecurity is rarely the top priority.

Read More

CoSN 2019 Recap: Why School Districts Need More than Just Single Sign-On

Last month, Identity Automation’s top K12 education experts traveled to Portland, Oregon for the Consortium for School Networking (CoSN) 2019 Annual Conference. CoSN, a member-based association and advocacy group, spotlights emerging technologies to K12 EdTech leaders.

Read More

Federated Identity Management: A Logical First Step in the IAM Maturity Model

Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenets, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move to cloud- or SaaS-based applications and are still manually creating users and passwords.

Read More

Subscribe Here!