Identity Automation Blog

Sumner-Bonney Lake School District Spotlight: Why RapidIdentity is a "Game Changer" for K-12

Spanning across the cities of Sumner and Bonney Lake, Washington, Sumner-Bonney Lake School District supports 1,075 employees and a steadily climbing student body of 10,000 through its identity access management (IAM) system management (IAM) system.

Read More

Identity Automation’s 2023 FETC Conference Recap

The 2023 FETC Conference in New Orleans just wrapped up, and our entire on-the-ground Identity Automation team was humbled to accept one of the industry’s top honors in the industry while also hosting a packed happy hour event, demonstrating award-winning IAM solutions, and meeting with top thought leaders throughout the four-day event.

Read More

Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program

While technology has created boundless new opportunities for learning, it has also produced ever-growing data security challenges. In years past, cyber defensive strategies were confined to internal environments.

Read More

Austin Independent School District Spotlight: Creating a Digital Ecosystem with “AISD Anywhere” Access

As the fifth-largest public school district in Texas, Austin Independent School District (ISD) is guided by the motto “AISD Anywhere” to provide 100,000 students, teachers, and parents greater access to their EdTech tools.

Read More

Clayton County Public Schools Spotlight: Securing Access District-Wide

As the fifth-largest school system in Georgia, Clayton County Public Schools (CCPS) has a history of delivering quality education to a diversity of students.

When Chief Technology Officer Rod Smith stepped into his role nine years ago, there were no online systems for students to log in and access resources.

Read More

Cyberthieves are Targeting Student Data, Is Your District Prepared? Part 2

In a recent post, we covered a major problem facing K-12 schools today: cybersecurity. Hackers are targeting educational institutions with alarming regularity—and the consequences of these delays can be major: If a student’s identity is stolen, it might not be discovered for years, until the student tries to take out a loan or get a credit card. 

Read More

Cyberthieves are Targeting Student Data, is Your District Prepared? Part 1

What is one of the biggest challenges facing K-12 schools today? It might surprise you, but the answer is “cybersecurity.” K-12 schools are a prime target for cyber attacks.

While they might not seem like the most obvious victims of a hack, K-12 schools are attractive for cyber criminals because they hold an enormous amount of student data—an increasingly attractive target for cyberthieves. Read on to learn more about the appeal of student information and why it’s at greater risk than ever for a data breach.

Read More

Our Top IAM Blog Posts for Education in 2017

Last week, we released our top five most popular Enterprise IAM Blogs from 2017. This week, we want to take a look back at some of our favorite higher education and K12 education-related content. From ransomware, to managing transient users, to student data privacy, we’ve covered a wide range of key topics in the industry.

Read More

How RapidIdentity Protects Student Data & the EFF’s “Spying on Students” Report

Within every market—whether it be government, business, healthcare or education—it’s crucial that identity and access management (IAM) solutions are designed and implemented with close adherence to the latest government, regulatory, and best practice security frameworks and laws, in order to help organizations meet their compliance goals and to ensure the integrity and security of their user data.

Read More

Our Top IAM Blog Posts for Education in 2016

Earlier this week, we released the most popular blog posts in 2016 from our Enterprise Blog. So today, we wanted to do the same with our K12 and higher education blog posts. After all, we’ve covered a variety of identity and access management (IAM) topics this year on our Education blog, including unique IAM challenges in higher ed, managing contingent users, provisioning users with multiple roles, and student data rostering.

Read More

Subscribe Here!