Identity Automation Blog

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part One

Often times, healthcare organizations have point solutions to address critical areas, but are still concerned about their broader security needs.

Read More

Leading the Discussion on Exception Handling in Access Management at the 2019 NYS Cyber Security Conference

Last month, our top Identity and Access Management (IAM) experts escaped the Texas heat and traveled to Albany, New York for the 22nd Annual New York State (NYS) Cyber Security Conference.

Read More

Mergers & Acquisitions: How IAM Solutions Make Day One Access a Reality

So your company is buying a company….

This is undoubtedly a huge step forward for your organization and a reason for celebration, but if you’re part of the IT department, you might be more focused on the long list of important tasks to be done immediately after the contract is signed.

Read More

A Look Back at FAEDS 2018: Discussing the Role of IAM Solutions in Education with Jackson County Schools

Last month, Identity Automation joined K12 school districts, colleges, and universities from around the state of Florida in Orlando for the FAEDS 2018 conference hosted by the Florida Association of Educational Data Systems.

Read More

The Zero Trust Model - What It is and Why It Starts with Identity

The digital transformation has significantly increased risk exposure for enterprises. With users operating a variety of devices from a variety of locations, there is a greater attack surface with less IT oversight and control.

Read More

A Just In Time Approach to Edge Use Access

No single access methodology can effectively manage every access use case across an organization. While Role-Based and Attribute-Based Access Controls (RBAC and ABAC) can cover the majority of a given user’s access needs, neither method is ideally suited for every use case; there will always be exceptions.

Read More

Why Role Nesting and Role Mining Won't Address Your Access Management Needs

As the number of employees, vendors, contractors, and departments within an organization grows, so too does the complexity associated with managing access to a growing number of applications and systems.

System administrators commonly manage this complexity by preemptively creating more roles for exceptions and edge use cases. And organizations with more limited or older legacy Identity and Access Management (IAM) systems often have no choice but to handle new access requests by assigning new roles to a user.

Read More

Why Role-Based and Attribute-Based Access Controls Alone Aren't Enough

Identity and Access Management (IAM) systems provide organizations with dynamic, wide-ranging methods for controlling access to their applications, systems, and proprietary resources. Role-Based and Attribute-Based Access Controls (RBAC and ABAC) are two of the most widely known and used methods.

Read More

RBAC vs ABAC Access Control Models - IAM Explained

At the highest level, identity management systems are typically composed of three major elements: users, systems/applications, and policies. Policies define how the users interact with the different systems and applications.

Read More

Subscribe Here!