Identity Automation Blog

Meeting the Challenge of Identity Automation in Schools

The new school year has begun and so have the challenges that come with managing thousands of student accounts. Recently, we saw an article about one school district in Tennessee that experienced the chaos of manual identity management first hand when they attempted to deploy their iPads for Kids Program.

Read More

3 Ways Schools Can Protect Against Dormant and Obsolete Accounts in an Active Directory

During every school year, faculty members resign, students graduate and staff are terminated. However, when a student or an employee leaves the school, who makes sure their accounts are deactivated and deleted?

Read More

A Protocol Predicament - When Apps Come to Class

News of a school district grappling with the security pitfalls of access management made headlines recently and it caught our eye. According to ZDNet, when Bearden Middle School in Knoxville, Tennessee issued new iPads to their students as part of the national iPads for Kids Program, they had few options at their disposal for securing them.

Read More

The Internet of Insecurity: How IoT Puts Information at Risk

To say that the Internet of Things (IoT) has been a hot topic lately would be an understatement. Over the last few years, talk about IoT has rocketed from zero to a hundred, and has created a growing number of eager early adopters who want to take shiny, new IoT devices home with them right now. At the same time, some businesses have already started dipping their toes into the IoT lake. However, like many technologies ahead of their time, the increase in the number of IoT devices is quickly outpaced by the number of ways they can be breached by cyber criminals.

Read More

Orphan accounts. What’s the big deal?

First off, what is an Orphan account?

Orphan accounts are the accounts that have somehow slipped past the de-provisioning paper trail.  Those accounts that still have organizational access to systems without a valid owner.  

Read More

The Ongoing Threat of Rogue Employees and How an Identity Management Solution Can Help Guard Your Data.

I recently presented at the 2nd Annual ISACA Cybersecurity Conference in Houston, TX, held by the Information Systems Audit and Control Association (ISACA), a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance. Other presenters revealed some new, interesting ways to protect organizations from security threats, and as always, conversations other attendees proved enlightening. This year, they gave me some insight into reasons why people don’t have more effective security systems.

Read More

The Secret to Providing Secure Access on and off Campus: Identity Management

Most college students use technology on a daily (if not hourly basis), and view it as an essential tool. Students use technology to complete a variety of tasks, especially in relation to coursework, such as research and turning in homework. Modern students expect their school’s technology to integrate seamlessly into their lives and make the learning experience easier. And that’s just the average college student; budding engineers and technological geniuses expect their college to provide them with up-to-date hardware and software solutions.

Read More

Correlation Mini-Series: Behavioral Correlation

In the first two installments of our Correlation Mini-Series, we talked about Identity Correlation and Event Correlation. In our final installment, today we address a new type of correlation called Behavioral Correlation.

Read More

Correlation Mini-Series: Event Correlation

Yesterday, we kicked off our Correlation Mini-Series by discussing Identity Correlation. Today, In the second installment of that mini-series, we’ll discuss what we see as the second most frequent type of correlation we run into, event correlation.

Read More

Correlation Mini-Series: Identity Correlation

Correlation is a topic that’s increasingly becoming a larger part of our conversations with customers and prospects. It’s also a subject that we think will continue to get more attention in the future.

Read More

Subscribe Here!