Identity Automation Blog

7 Steps to Successfully Marketing Your IAM Solutions


Launching new IT initiatives is always a challenge, and the roll-out and adoption of a new identity and access management (IAM) program is no exception. While you understand how your IAM solution will better secure your organization and data and make getting work done easier, your co-workers don’t always look positively on change.

Read More

RBAC vs ABAC Access Control Models - IAM Explained



At the highest level, identity management systems are typically composed of three major elements: users, systems/applications, and policies. Policies define how the users interact with the different systems and applications.

Read More

Why Your Identity and Access Management Project Needs a Brand


As a marketing professional one of the most important jobs my team and I perform is building support and loyalty around our company’s brand. Building a brand the right way helps to create a strong community that believes strongly in our products, ultimately creating evangelists. Effective branding contributes to getting people fired up and ready to buy.

Read More

The Many Flavors of IDaaS: Choosing the Right One for Your Organization


In previous installments of this series, we discussed the emergence of Identity as a Service (IDaaS) and the benefits it offers. We also cleared up some of the most common misconceptions surrounding IDaaS. Now that you have a better understanding of the technology and its potential, let’s examine the most common IDaaS models, so that you can choose the right one for your organization.

Read More

The 2 Most Common IDaaS Misperceptions


In our last post, we discussed some of the most compelling reasons for adopting identity and access management (IAM) in the cloud. Like most other cloud services, identity as a service (IDaaS) offers cost-effective, high availability and affordable scalability. However, as you consider the possibility of moving from your legacy, on-premises IAM system to the cloud, it’s vital that you begin with a clear understanding of common misperceptions that haunt the emerging IDaaS market; here are the two biggest ones:

Read More

Why All the Interest in Cloud-Based IAM?


It’s practically a given that at least some of your IT systems and operations are in now in the cloud. In fact, 70 percent of small businesses and 90 percent of midmarket enterprises do, and the rest must begin to do so soon or risk falling behind their competition. According to Cisco, 83 percent of all data center traffic will be based in the cloud within the next three years; 2017 will see a particularly significant migration of workloads moving to cloud-based platforms, with IT modernization leading the way.

Read More

Managing Infrastructure with RapidIdentity Part 4: Checking the Status of RapidIdentity Password Filter Installations on DC’s


Today, I want to look at one of the ways that RapidIdentity allows administrators to automate tedious and cumbersome tasks. I’ll demonstrate a way to analyze Windows domain controllers for the presence of a specific software installation and also provide the entire RapidConnect action at the end of the post, so that you can modify it to fit your needs.

Read More

Announcing the Release of RapidIdentity 4.1

Our latest release focuses on new features that will increase the speed and security of authentication requests for young students. Additionally, we have added enhancements to RapidPortal to help organize Applications. You will also find enhancements to the Reporting functionality to make it even easier to access the information you need.

Read More

IAM Solutions Explained - Configuration, Customization, or Out of the Box?


When organizations start or plan to start a new IAM initiative, one of the first steps they take is some form of requirements gathering. The idea is that the requirements represent the functional and nonfunctional (IAM) needs of an organization. Then, typically through some form of procurement, the organization attempts find a solution/service/product(s) that best aligns with those requirements.

Read More

Managing Infrastructure with RapidIdentity Part 3: Managing Windows Hosts

Recently, one of our RapidIdentity customers ran into a conundrum. While the customer heavily uses RapidConnect to synchronize their various application and authentication identity sources, they awoke to a mass Email stating that during their morning provisioning the displayName attribute on every user in their environment was changing!

Read More

Subscribe Here!