Building Bridges Washington Conference: Doing More with Less in IT

Last week our team attended the first “Building Bridges” Washington State Higher Education Technology Conference. The event brought together a diverse group of post-secondary education professionals focused on how technology can be used to maximize student success on campus and as they go into the workforce. Education IT staff, eLearning staff, library staff, institutional research staff, and campus faculty leadership were all in attendance. This broad representation of disciplines was fitting since the conference’s theme was “Building an environment of collaboration across boundaries”.

Read More

CoSN Preview: Education's Digital Leap to the Cloud

Next week, I will be taking part in the CoSN Annual Conference from March 16-19 in Atlanta. CoSN, or Consortium for School Networking, is the leading association for school district technology leaders. I’ve attended this conference before; however, this year’s theme of ‘Enabling Your Digital Leap’ is quite intriguing.

Read More

My Epiphany at Brainstorm 16.0

Last week I was in Wisconsin attending the BrainStorm 16.0 conference where I had an epiphany:

Identity management was originally developed to help organizations either adhere to external compliance concerns, such as HIPAA or SOX, or internal governance concerns like process controls. The net result of these concerns was automating processes to force compliance. Technically speaking, automation then became a side effect of compliance.

In education, however, the initial concern was not governance, but rather the bulk management of massive environments. A school’s entrypoint to identity management had always started with automation.

At Brainstorm 16.0, I realized that schools are now more and more concerned with ensuring appropriate student/teacher access to systems and programs, which, ironically, is actually the old way of seeing identity management.

Read More

The Overlooked Nature of Internal Security Vulnerabilities

Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.

Read More

Identity Automation Is a Proud Signatory of the Student Privacy Pledge

Joining over 100 corporations including Apple, Google, Khan Academy, and Microsoft, we are pleased to support Student Privacy Pledge in their mission to safeguard the privacy of students in grades K through 12.

Read More

RapidIdentity: Renaming our Products

Today, I’m writing with a big announcement. When we introduced our new brand identity several months ago – a new logo, new website, and new marketing materials – we were changing our look to better represent who we are today, and who we’ll be tomorrow – a provider of world-class identity management solutions.

Read More

Gartner Cites Identity Automation’s Outstanding Customer Support

Identity Automation, a fast-growing identity management software provider, is thrilled to be included in the 2015 Gartner Magic Quadrant for Identity Governance and Administration, which cited its outstanding customer support. The 2015 Magic Quadrant for IGA, which is dedicated to providing qualitative analysis of market trends and top performers, was released last week.

Read More

Identity and access management for 10 million users? No sweat!

Identity Automation was featured in a recent Network World article:

Read More

Version 3.1 Product Release

We are excited to announce the release of ARMS and DSS Version 3.1 on April 1st. This release has several bug fixes as well as many new features. The new features we would like to highlight are the new Mobile UI for ARMS and the Multi-Factor Authentication for FIMS.

Read More

K-12 schools make the grade

Network World published an article entitled K-12 schools can make the grade with identity and access management featuring one of Identity Automation’s customers and the use of our software in their environment:

Read More

Subscribe Here!