Identity Automation Blog

Making the Case to Your CIO to Upgrade Your IAM System, Part 2

In the first installment in this blog series, we looked at the many trends in the business landscape today (digital transformation, a changing workforce, and the shift to cloud IT infrastructures, among others) that are driving the need for a more comprehensive and integrated IAM solution. In our second blog in this series, we will take a look at why evolving regulatory and threat landscapes, combined with shrinking IT budgets, have necessitated more robust, modern IAM solutions.

Read More

Workforce Identity Management Should Be the Core of Any Retail Information Security Program

When you hear about retail establishments suffering from a data breach, names like Neiman Marcus, Target, The TJX Companies, Michaels, and The Home Depot dominate the headlines. When you read these news stories, it might appear as if cyber criminals are only going after the big fish. Unfortunately, this might lull small and mid-sized businesses into thinking that they are not likely to be the targets of such an attack. This is supported by recent research that shows that more than three-quarters of all SMBs believe that they are safe from to cyber attacks.

The truth is, small and medium sized retailers make up 62 percent of the data-breach victim pool, because attackers know that small and mid-sized businesses are:

Read More

The Value of Identity Part 3: Five Steps to Avoid a Breach



In Part 1 and Part 2 of my series on the value of identity, we looked at the consequences of revealing excessive personal information in public, more specifically the digital realm, can have on the individual and an organization. We saw that hackers can use the information you reveal on social media and the internet not only to impersonate and steal your identity, but to even infiltrate and take control of your company’s network. 

Read More

Making the Case to Your CIO to Upgrade Your IAM System, Part 1

According to the new 2016 Verizon Data Breach Investigations Report (DBIR), legitimate user credentials were used in most data breaches, with some 63 percent of them using weak, default, or stolen passwords. This may come as some surprise to businesses that are not yet victims of such breaches as they continue to utilize homegrown, piecemeal, or legacy identity access management (IAM) solutions. While your CIO is focused on perimeter defense, your challenge is to shift this focus to the need for a more robust, modern, and integrated IAM solution, which is easier said than done.

Read More

The Value of Identity Part 2: The Company’s Perspective


In my recent post, I discussed how in today’s world, identity is ubiquitous – it reaches into almost everything we touch, while identity theft and fraud have become near constant topics in the news.

Read More

James Litton Talks Cybersecurity and Identity and Access Management Trends with ISSA

Recently, our CEO, James Litton sat down with the South Texas chapter of ISSA as part of the organization's podcast series on cybersecurity. Their conversation covered a wide range of security and identity and access management (IAM) topics, including identity and the Internet of Things, the future of passwords, contingent workers, IAM and the cloud, and much more.

Read More

The Value of Identity Part 1: Identity Gets Personal

Over the past two decades, my work in information technology has exposed me to home end users, as well as corporate environments of every shape and size, throughout most sectors of the industry. These experiences have provided a unique perspective into the struggles that individuals and organizations face regarding personal information and proper user identity and data management.

Read More

Protecting Retail from Security Threats with Workforce IAM

It is a challenging reality of the retail sector that employees are traditionally the weakest link to deterring digital security threats, such as system breaches and data theft. In a complex environment where employee turnover, seasonal workers, a mobile workforce, and shifting roles are a constant challenge, protecting the organization from security threats requires a vigilant approach to access and identity governance.

Read More

4 Signs You Need to Modernize Your Identity Management Software

According to Statista, the market for identity and access management is expected to grow to 7.1 billion dollars by the year 2018. This is up from 4.5 billion dollars in 2012; and much of this growth can be attributed to the fact that so many organizations are looking to upgrade their identity management software to better meet the security and workflow needs their company faces.

Unfortunately, there is no odometer on your current identity management solution that tells you it is time for an upgrade. Instead, knowing when you need to look at making a change can be determined by these four key factors.

Read More

Lock Down Access to Admin Accounts with On-Demand Privileged Access Management

Intruders Can’t Drive You Nuts If You Don’t Give Them the Keys!

Nearly every enterprise system, application, and database comes with a privileged account.  Administrators need these privileged accounts to install software updates, reset passwords, set up or deactivate accounts, and perform other standard administrative tasks.
Read More

Subscribe Here!