Evaluate Your Identity Governance & Administration Capabilities with the Governance Maturity Model, Part Two

Time and time again, we see data breaches frequenting the headlines, and it isn’t slowing down anytime soon. In fact, 2019 alone saw two of the top five largest data breaches recorded in all time.

Read More

Evaluate Your Identity Governance & Administration Capabilities with the Governance Maturity Model, Part One

Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.

Read More

Identity Automation Earns Honorable Mention in 2019 Gartner Magic Quadrant for IGA

I’m pleased to announce that Identity Automation was acknowledged as an Honorable Mention in Gartner’s 2019 Magic Quadrant for Identity Governance and Administration (IGA).

Read More

Mergers & Acquisitions: Managing Identities Across Multiple Domains

The mergers & acquisitions (M&A) market is red hot, and there is a good chance your company will be involved in an M&A at some point in your career. The work that it takes to pull off a successful M&A, however, can be staggering, and 70-90 percent end up being considered abysmal failures.

Read More

Modern IAM and the Student and Alumni Experience

Delivering an optimal student and alumni experience is top requirement for CIOs at higher education institutions. More and more, this puts pressure on them to provide an optimal digital experience, as technology and cloud resources continue to play a growing role on college campuses.

Read More

Healthcare M&A: How IAM Helps Tackle Common Integration & Consolidation Challenges, Part 1

Healthcare mergers and acquisitions (M&As) are happening more frequently than ever. In fact, 2017 was a banner year for M&As, with 115 transactions, including 10 deals between hospitals with a net revenue of over $1 billion—the highest number in recent history.

Read More

Meeting Compliance Requirements - What Your Organization Should Know

Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.

Read More

How and Where You Should Be Investing for Cybersecurity

It’s a new year and it’s time to figure out what purchases, projects, and services your organization will need in the near future. No doubt, your wish list will far exceed your budget.

To meet your security needs within a budget, make sure you are investing enough in IT security by shoring up your identity and access management (IAM) program. In order to truly enable your business, you must first embrace security, and that means putting IAM at the core of your security program.

Read More

Corporate Governance is More Than a Good InfoSec Policy

*Disclaimer: This article originally appeared on IDG Connect

Over the past few years, Governance, Risk, and Compliance (GRC) have become three of the hottest topics in Information Technology circles. The growing demand for compliance with federal and state laws, as well as industry best practices, has necessitated a closer look at IT governance, as well as solutions that help to ensure an organization has invested their time and efforts wisely, through management and implementation of such technologies as access control, data protection, and identity provisioning and management. Proper design, application, and usage of these key technologies (and others) help to control necessary risk management activities and ease the efforts that are required to remediate or address areas where compliance is lacking. 

Read More

Subscribe Here!