Identity Automation Blog

Modern IAM and the Student and Alumni Experience

Delivering an optimal student and alumni experience is top requirement for CIOs at higher education institutions. More and more, this puts pressure on them to provide an optimal digital experience, as technology and cloud resources continue to play a growing role on college campuses.

Read More

Healthcare M&A: How IAM Helps Tackle Common Integration & Consolidation Challenges, Part 1

Healthcare mergers and acquisitions (M&As) are happening more frequently than ever. In fact, 2017 was a banner year for M&As, with 115 transactions, including 10 deals between hospitals with a net revenue of over $1 billion—the highest number in recent history.

Read More

Why Legacy, Homegrown, and Open-Source IAM Systems Can't Address Higher Education's Identity Management Challenges

While higher education institutions face many of the same identity and access management (IAM) challenges as corporations, they also must overcome a number of complex and unique hurdles that typically aren’t seen in corporate enterprise deployments.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 2

In Part 1 of this series, we discussed the challenges that come with onboarding employees and granting access, specifically determining which permissions to give an employee, providing employees with day one access, and managing ad-hoc access requests.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 1

Identity lifecycle management presents a number of challenges: You need to quickly onboard employees so that they have access to the applications needed to do their jobs, you need to immediately offboard them when they leave the organization so they’re not a security threat, and you need to ensure IT isn’t bogged down with all changes in between as employees shift roles, get promoted, change locations, and so on.

Read More

Delegated Administration of User Accounts Part 3 - The Delegation Model

We recently wrote about delegated administration, a powerful Identity and Access Management (IAM) system feature and how it gives organizations the ability to assign control of of activities directly to business managers and system owners, as well as some common use case scenarios.

Read More

Delegated Administration of User Accounts Part 2 - Delegation Examples

In part 1 of our delegated administration blog series, we discussed how delegation is an Identity and Access Management (IAM) system feature that gives authorized individuals or groups of users the ability to view another user’s data and take some form of action on that user's account.

Read More

Delegated Administration of User Accounts, Part 1

One of the most powerful features of any modern Identity and Access Management (IAM) system is delegated administration and management of users. With delegated administration, organizations can reassign control of identity management activities, such new account creation, role and group assignment, and access requests from the IT team to non-IT employees, such as business managers.

Read More

How and Where You Should Be Investing for Cybersecurity

It’s a new year and it’s time to figure out what purchases, projects, and services your organization will need in the near future. No doubt, your wish list will far exceed your budget.

To meet your security needs within a budget, make sure you are investing enough in IT security by shoring up your identity and access management (IAM) program. In order to truly enable your business, you must first embrace security, and that means putting IAM at the core of your security program.

Read More

Data Best Practices to Follow for a Successful IAM Implementation, Data Series Part 3

Data is found at every point in the process and just about everything inside of the IAM systems relies on that data. While we might sound like a broken record, the better shape your data is in, the more successful (and easier, faster, cheaper, and less painful) your IAM implementation and ongoing operations will be.

Read More

Subscribe Here!