Identity Automation Blog

Access Denied: Safeguarding Digital Learning Resources in the New Classroom

Recently, we discussed the importance of Multi-Factor Authentication (MFA) as a tool school districts should leverage to help prevent data breaches and protect against threat actors. MFA is a sure step towards securing access to district systems and applications; however, with at-home instruction being K-12 education’s new normal, schools need to take an even more comprehensive approach to securing their resources. 

Read More

Increasing Healthcare Security & Usability with the IAM Maturity Model

Identity and Access Management (IAM) in healthcare is designed to achieve the balance of strengthening security measures and enhancing clinical workflows through efficient access to digital tools and records— all the while meeting HIPAA and HITECH compliance.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part Two

Maturity models can be used to evaluate the effectiveness of current capabilities and set a prioritization level when an organization is ready to advance its capabilities. When applying a maturity model to Identity and Access Management (IAM), however, it’s important to examine the key tenets of an overall IAM strategy.

Read More

Cut the Paper Trail and Stay DEA Compliant With EPCS Solutions

Enhanced security, increased patient safety, reduced risk of prescription fraud, better patient experience— the benefits of Electronic Prescriptions for Controlled Substances (EPCS) are clear. Spurred in response to the opioid crisis, EPCS eliminates paper prescriptions by allowing clinical prescribers to electronically write prescriptions for controlled substances. It also permits pharmacies to receive, dispense, and archive e-prescriptions.

Read More

How IAM Makes or Breaks Customer Experience During an M&A

There’s no question that merger and acquisition (M&A) transitions are incredibly complex, making successful integration a major component in realizing their full value. From a technology standpoint, this means implementing solutions, such as modern Identity and Access Management (IAM), that make integration as simple as possible.

Read More

Take Proactive Measures to Ensure End-to-End Identity and Access Management Using Microsoft Azure AD

As organizations continue their migration to the cloud, for many this now includes their Active Directory (AD). For example, in the education space there’s been a recent push by Microsoft for school districts utilizing Office 365 to adopt Microsoft InTune, a mobile device management platform for K12 education. However, InTune only works with Microsoft Azure AD, thus, requiring a shift from an on-premise AD model to SaaS-based Microsoft Azure AD.

Read More

Gartner 2019 Recap: How Automated Access Management Can Save More Than Money

It was another great year for Identity Automation at Gartner’s Identity and Access Management Summit. Gartner is the world’s leading research and advisory company, and attendees included trailblazers, thought leaders, and industry experts pushing the bounds of Identity and Access Management (IAM). Key members of our team put their cards on the table in sunny Las Vegas and had some serious conversations with representatives from varied backgrounds and industries.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part Two

Access Management (AM) is a critical area in any cybersecurity strategy that refers to how identities are applied to the data and resources in an organization’s environment, ensuring users have the correct access to the appropriate systems, resources, and applications.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part One

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Subscribe Here!