How The Department of Defense can use identity management to protect critical information

The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.

Read More

Is Your School’s IT Department Overwhelmed? Automation Can Help

School’s back in session. With the influx of new students, returning teachers and temporary staff coming back online, requests for account creations, resource partitioning and call support elicit groans across countless IT departments.

Read More

How to Integrate Cloud Applications with Dedicated Utility Accounts

With all the cloud products and applications now available, more organizations are finding it valuable to integrate them, such as linking Salesforce.com to your accounting package so data from both can be viewed together. However, as companies integrate cloud accounts, we’ve noticed a number of them run into problems maintaining those integrations down the road. When integrating cloud accounts, you often need to choose an internal user account to create the bi-directional connections and truly link the applications. For example, if we were to connect Hubspot to Salesforce, we would need to enter a Salesforce account (username and password) into Hubspot. This process works fine until the person who owned that Salesforce account leaves the company. When that happens, the integration you previously had is now useless.

Read More

Technology Encourages Communication & Engagement at New Caney Independent School District

I recently visited Woodridge Forest Middle School in Porter, Texas, one of the newest schools within the New Caney Independent School District, to record a new Identity Automation video, which will highlight one of the school district’s recent successes using Identity Automation’s software. New Caney used RapidIdentity to fulfill its 1:Vision initiative and issue over 10,000 Chromebooks to teachers and students, enabling greater student engagement and a new Project-based Learning curriculum

Read More

Is Biometric Authentication as Secure as We Initially Believed?

Remember when Apple introduced Touch ID for its devices? Rather than typing a numerical password, a user could program his or her fingerprint into the device to lock and unlock it. Many thought it was a very innovative approach to device security and at the time of its announcement, some believed it was a new era of device security.

Read More

Analyzing and Improving Student Privacy in Education

Privacy in education is a subject that has received significant attention recently, and we see it garnering even more attention in the future. It affects students, teachers, administrators, parents, IT staff and IT vendors. All involved tread a fine line, balancing the security issues that are vital to the operation of a school with the individual privacy rights of the actual classroom users of technology.

Read More

ISACA CyberSecurity Conference

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Read More

Learn Modern Best Practices in Identity Management - Is Your Solution Keeping Up?

Identity Automation will be hosting the second of the four webinar series with Carahsoft on Thursday, August 6. Next week’s topic will discuss some of the best practices and guidelines all schools can follow to ensure their identity management system is keeping up with the recent advances in educational technology.

Read More

Learn the Benefits of Automated Identity Access Management

Did you know that 50-60% of today’s organizations still rely on manual Identity Access Management (IAM)?

While automated IAM technologies like RapidIdentity enable administrators to automatically provision and monitor users and grant time-based access, manual IAM requires admins to manually change these factors for each individual within the organization. This system can lead to lapses in access restriction and ultimately large losses in time, money and security.

Read More

North Carolina Department of Public Instruction Completes Roll-Out of Identity Automation

A few years ago, North Carolina’s Department of Public Instruction (NCDPI) selected Identity Automation to build a cloud identity platform to manage all its users in all its public schools. Each student, teacher, staff member and administrator at every K-12 public school would be using the platform to access all the state provided applications and programs they needed to use on a daily basis.

Read More

Subscribe Here!