Identity Management Blog

Cybercrime continues to increase unabated and at a torrid pace. In 2016, according to the Ponemon Institute, the estimated average cost of a data breach for an organization was $4 million dollars. And that cost increases the longer it takes the organization to detect and contain the breach. It also has an increasingly negative effect to the organization’s reputation. At this point, a breach is almost inevitable. The number of attacks continues to rise and have become more sophisticated and difficult for Cyber Security professionals to keep up with. Social engineering (mainly phishing) is ...
Read More
I have returned from a frantic, exciting, and exhausting three days in Las Vegas to attend the yearly Black Hat conference. It’s a great event with a lot of attendees, sponsors, vendors, and quality content and this year marked the 20th year for Black Hat. While the conference is not specifically about Identity & Access Management (IAM), you can’t escape the fact that identity is everywhere and ...
This month, we’re happy to highlight SailPoint Engineer, Elaine Van Horn.  Elaine came to Identropy in early 2016 after many years in IT.  Originally, she was in the casino gaming world until she moved into finance and banking.   She’s worked with a number of systems and platforms as a programmer and analyst. She began working with the SailPoint products in 2010 and hasn’t looked back since. ...
The Identropy Advisory team recently came together and presented to a group of CISOs in Upstate New York. The topic: The High Cost of Not Doing IAM Right. As part of that discussion, we talked about how failing at Identity and Access Management (IAM) can lead to an increase not only in the number of breaches, but the costs associated with remediating them. While good IAM is hard, failing at it ...
TLDR; Are you getting your arms around how to scale your Identity and Access Management (IAM) platform to your end-customers? In the past we've discussed the distinction between Enterprise IAM and CIAM. Today we're going to take a deeper dive into CIAM and explore how that space is further sub-divided in some pretty important ways.  If you’re in any outward facing business, which you probably ...
If you’re a customer of ours, most likely you’ve worked with Chad Wolcott. Chad is Identropy’s Practice Director and is our Staff Spotlight for June. For the past decade, Chad has worked closely with clients across the globe helping them navigate the dangerous waters of Identity and Access Management (IAM). Prior to joining Identropy, he was the VP of Global Services for Courion Corporation where ...
Photo Credit The 2017 Cloud Identity Summit has just concluded. This year, the conference was in my hometown of Chicago where more than 1400 people representing over a thousand companies congregated to talk, learn, and share what is going on with identity across all spectrums. This was my second year attending. I feel this is one of the better IAM conferences and is worth attending if you are ...
Granting access to a user is an exercise in trust. This is why information security best practices preach following the principle of “least privilege” to mitigate the risk of trusting a user. But even when we give a user exactly and only the right privileges to do their jobs, we are still trusting them with those privileges and expecting them to use them for the right things. An important part of ...
As technology becomes increasingly important to corporate success, so does the value of managing access to resources. Creating effective and intuitive IAM services that make it easy for the business to obtain the required access in a safe and secure manner can minimize the complexities associated with IAM.
For the month of May, we would like to highlight fellow Identropian, Diane Spinelli.  Diane’s current role is Client Partner & Group Manager, which is critical to help bridge the gap between client and company, ensuring that the project for the client’s IAM program is a success.  Not always an easy feat!