Identity Automation Blog

Businesses Need To Adopt A Zero-Trust Approach To Stay Secure While Working Remotely

*Disclaimer: This article originally appeared on Forbes.

With COVID-19 forcing organizations of all sizes to shift employees to remote work, some may be concerned their company’s cybersecurity measures are inadequate. Though COVID-19 is the most drastic recent example of necessitating working from home, it certainly won’t be the last.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part Two

Maturity models can be used to evaluate the effectiveness of current capabilities and set a prioritization level when an organization is ready to advance its capabilities. When applying a maturity model to Identity and Access Management (IAM), however, it’s important to examine the key tenets of an overall IAM strategy.

Read More

Cut the Paper Trail and Stay DEA Compliant With EPCS Solutions

Enhanced security, increased patient safety, reduced risk of prescription fraud, better patient experience— the benefits of Electronic Prescriptions for Controlled Substances (EPCS) are clear. Spurred in response to the opioid crisis, EPCS eliminates paper prescriptions by allowing clinical prescribers to electronically write prescriptions for controlled substances. It also permits pharmacies to receive, dispense, and archive e-prescriptions.

Read More

Assessing Your Identity Governance & Administration Solution, Part Two

Time and time again, we see data breaches frequenting the headlines, and it isn’t slowing down anytime soon. In fact, 2019 alone saw two of the top five largest data breaches recorded in all time.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part Two

Access Management (AM) is a critical area in any cybersecurity strategy that refers to how identities are applied to the data and resources in an organization’s environment, ensuring users have the correct access to the appropriate systems, resources, and applications.

Read More

Assessing Your Identity Governance & Administration Solution, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Capital One Data Breach Recap: Keep Your Organization Ahead of the Curve With IAM

March 23, 2019 seemed like any other Monday at Capital One headquarters. Little did employees and customers know that, over the weekend, a hacker had successfully breached Capital One’s security defenses. 

As a result, more than 140,000 Social Security Numbers, 1 million Canadian Social Insurance numbers, and over 80,000 pieces of banking and credit information were stolen, along with an undisclosed number of names, addresses, credit scores, and more. 

Read More

Identity Automation Earns Honorable Mention in 2019 Gartner Magic Quadrant for IGA

I’m pleased to announce that Identity Automation was acknowledged as an Honorable Mention in Gartner’s 2019 Magic Quadrant for Identity Governance and Administration (IGA).

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part Two

In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model, Part One

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Subscribe Here!