Identity Automation Blog

Load Balancing Applications and Services Using an Appliance

Many of our customers have found that as the number of critical applications and services increases in their environment, so does the need to deliver them to their users continuously. Additionally, users are demanding more out of the applications, wanting customized views, dynamic data, and ad-hoc reporting. These requirements are putting additional stress on the web servers and application infrastructure. Often, web or application servers become overly taxed, and appear non-responsive to the users.

Read More

Cloud Computing

As technology evolves we are finding that the methods for application delivery are also evolving. While there are a number of varying technologies such as application streaming and terminal services, the most exciting is the movement of applications into the cloud. Moving applications and services to the cloud allows them to be consumed via a browser which completely changes the landscape in terms of end-user platform requirements, licensing management and so much more.

Read More

Total Identity Management System

Identity Automation is pleased to announce its Total Identity Management System (TiMS) solution architecture.

Read More

When to Use Workflow in Your Identity Management Solution

During an identity management project, we frequently have discussions with our customers about provisioning via workflow. Some customers expect that they will have to deploy workflow to perform any type of provisioning while others hope to fully automate the entire process.

Read More

Hosted Identity Management and Data Integration Solutions

Back in March I gave Five Reason Why You Need An IDM Solution. We regularly talk with customers that would like to implement some sort of Identity Management (IDM) or Data Integration (DI) solution but are challenged with implementation costs, licensing costs, skills capability for infrastructure management and skills capability to manage and maintain the “drivers” that facilitate the movement of data between systems.

Read More

Linux in the Datacenter

Businesses around the world are increasing performance, reliability and agility by deploying Linux into their datacenters. These deployments carry a variety of workloads such as Web and network services as well as mission-critical applications and databases.

Read More

Compliance Automation and Validation

In today’s highly regulated enterprise, the importance of ensuring and maintaining compliance to mandated requirements is well understood. Failure to abide by these requirements can be very costly in terms of fines and in securing the technology resources needed to resolve the issues. In some extreme cases failure to comply can result in the suspension of business operations while the identified gaps are remediated.

Read More

Taking Virtualization to the Next Level

Most of us are intimately familiar with the concept of virtualizing operating systems. In fact, running virtual machines on our desktops has become so ubiquitous that average, non-technical, computer users are even in on the game.

Read More

Enterprise-class XenServer for FREE

Identity Automation is a huge proponent of open source software and we use a lot of it in our internal operations, in our solutions and in custom consulting work for our customers.

Read More

Keeping Notes When on the Road

I don’t know about you but I am a thinker in the car. Perhaps that’s because with traffic there is really nothing else to do BUT think.

Read More

Subscribe Here!