Healthcare M&A: How IAM Helps Tackle Common Integration & Consolidation Challenges, Part 2

More and more, healthcare as providers are merging together or acquiring other hospitals to increase their footprint, provide higher levels of patient care, and enable strategic synergies.

Modern identity and access management (IAM) solutions are a crucial, but often overlooked facilitator of IT integration. Having the right IAM solution in place not only reduces time, costs, and integration conflicts, but also ensures a smoother transition for both clinicians and patients.

Read More

A Look Back at FAEDS 2018: Discussing the Role of IAM Solutions in Education with Jackson County Schools

Last month, Identity Automation joined K12 school districts, colleges, and universities from around the state of Florida in Orlando for the FAEDS 2018 conference hosted by the Florida Association of Educational Data Systems.

Read More

Healthcare M&A: How IAM Helps Tackle Common Integration & Consolidation Challenges, Part 1

Healthcare mergers and acquisitions (M&As) are happening more frequently than ever. In fact, 2017 was a banner year for M&As, with 115 transactions, including 10 deals between hospitals with a net revenue of over $1 billion—the highest number in recent history.

Read More

Choosing the Right Proximity Badge Access Solution for Your Healthcare Organization

In busy hospital settings, clinicians move from room to room and department to department. They require multiple logins as they switch from one workstation to another and access multiple endpoint devices, such as thick and thin clients running Windows- or Linux-based operating systems.

Read More

Why Legacy, Homegrown, and Open-Source IAM Systems Can't Address Higher Education's Identity Management Challenges

While higher education institutions face many of the same identity and access management (IAM) challenges as corporations, they also must overcome a number of complex and unique hurdles that typically aren’t seen in corporate enterprise deployments.

Read More

Security Breaches in Healthcare That Scare Even Us


Though many of us know that healthcare data is valuable, not all of us are aware of exactly how valuable it is. Electronic health records (EHRs) are a one-stop shop for all the data a hacker wants: medical, financial, and personal. Some data doesn’t age either—for example, your birth date and Social Security number never change.

Read More

Two-Factor Authentication (2FA) Explained: Email and SMS OTPs

One time passwords (OTPs) are a popular choice for organizations looking to step up their security with two-factor authentication (2FA). These randomly generated passwords are only valid for a single login session and overcome many of the vulnerabilities of traditional passwords.

Read More

Two-Factor Authentication (2FA) Explained: Challenge Response Authentication

Challenge/Response, also known as knowledge-based authentication, is a form of authentication where users verify their identities by answering “challenge” questions based on personal information about the user.

Read More

Two-Factor Authentication (2FA) Explained: Push Notifications

More and more, organizations are looking for cost-effective alternatives to traditional passwords that increase security without affecting usability. Many people believe that push notification authentication, a newer mobile-based authentication method, could be the answer.

Read More

Two-Factor Authentication (2FA) Explained: RFID Access Control

Historically, magnetic stripe cards were used for access control. However, these cards aren’t particularly secure, as the information stored on them is typically not encrypted. Additionally, they have to be physically swiped, leading to issues with wear and tear.

Read More

Subscribe Here!