Identity Automation Blog

Federated Identity Management: A Logical First Step in the IAM Maturity Model

Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenets, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move to cloud- or SaaS-based applications and are still manually creating users and passwords.

Read More

Mergers & Acquisitions: Why Successful Technology Integration Starts with the Right IAM Solution

As an IT professional, you know that an M&A comes with responsibility and expectations for your team. After the deal closes and the celebration is over, you and your team are just getting started. IT plays a huge role in the merging of two companies, and with the amount of time and money that goes into an M&A, your executive team expects a successful integration.

Read More

A Look Back at Q1: Announcing Record Growth and Executive Team Expansion

I’m pleased to share our latest press release announcing record advances in the first quarter of 2019 as part of our Identity Automation 2.0 growth strategy, a targeted initiative to scale the business with increased focus on execution.

Read More

Mergers & Acquisitions: Managing Identities Across Multiple Domains

The mergers & acquisitions (M&A) market is red hot, and there is a good chance your company will be involved in an M&A at some point in your career. The work that it takes to pull off a successful M&A, however, can be staggering, and 70-90 percent end up being considered abysmal failures.

Read More

Mergers & Acquisitions: How IAM Solutions Make Day One Access a Reality

So your company is buying a company….

This is undoubtedly a huge step forward for your organization and a reason for celebration, but if you’re part of the IT department, you might be more focused on the long list of important tasks to be done immediately after the contract is signed.

Read More

Identity Automation and Adnet Announce Strategic Partnership

Strategic Alignment Poised to Deliver Comprehensive Identity and Access Management Platform to Oceania Region

Sydney, Australia, January 28, 2019 ⎯ Identity Automation, leading provider of Identity and Access Management (IAM) solutions, and Adnet Technology Australia, IT procurement and services delivery provider within the Oceanic region, today announced their strategic partnership to support organizations in the Oceania region.

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 1 - Social Attacks & Phishing Schemes

In healthcare, the pressure is always on to drive down overall costs and provide higher levels of patient care. The result: a never-ending quest to increase efficiency. EMR’s, telehealth tools, and other third-party IT solutions that enhance productivity and streamline clinician workflows have become the norm.

Read More

Meet Our Team: Joseph Kelly, Vice President of Delivery

Our Meet Our Team blog series is shining its next spotlight on Joseph Kelly, Vice President of Delivery. He joined the team in February 2018 and calls himself an accidental project manager who fell into a career he loves by chance—a path which eventually led him to Identity Automation.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 3

Another year, another series of data breach headlines. 2018 has come to a close, and we’ve been looking back at one of the year’s biggest and potentially costliest breaches: the British Airways data breach that was announced back in September. With approximately 380,000 booking transactions exposed and more than $1 billion in potential fines and lawsuits, the breach offers many important lessons.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 2

The recent British Airways breach is only one of many recent breach headlines, but it got us thinking about the importance of getting security basics right. All too often, the biggest breach headlines—and the ones with the largest financial and reputational impact—are the result of minor and preventable security vulnerabilities.

Hackers continue to use the same tried and tested techniques because they know that, all too often, companies aren't putting enough time and effort into basic security measures.

Read More

Subscribe Here!