Identity Management Blog

We all try to do as much as we can on our own, but sometimes, help is needed to get the job done the right way, in the right amount of time. This is why a consultant can be a valuable asset for your identity management enterprise efforts and other initiatives.
Read More
The healthcare industry has been riddled with security and HIPAA breaches, especially since electronic medical records have become a major contender and requirement in more and more doctor’s offices. With this increased need for security has come a demand for better identity management. As noted by the Electronic Health Reporter, Vice President of healthcare for LexisNexis Harry Jordan has said ...
Everyone loves a game of Monopoly, right? That is, unless the odds are turned against you, and suddenly your nemesis has acquired Boardwalk and all the Railroads after 5+ hours of gameplay. It’s happened all too often. It’s difficult to turn the game in your favor when this occurs--mainly because having the right strategy and gameplan, and being able to deal with chance, is the linchpin to ...
  The identity and access management (IAM) industry spends so much time talking about how technology is the key to unlocking your enterprise’s potential-- and while that’s certainly part of it -- we’re overlooking something very important in the process: People. No IAM program could be fully conceptualized or realized without a leader in the form of a CIO, CISO, a Program Manager or otherwise ...
Understanding the full extent of technology in the enterprise is akin to Alice’s drop down the rabbit hole. Once you fall in too deep, you may find something entirely different than what you originally bargained for; and then some, to top it all off. Suddenly, when you have to manage access and sensitive information on such a granular level, things aren’t as clear as before, and discerning who ...
Everything the light touches is your enterprise--and that would be fine if the dark patches didn’t affect security and the risk of a breach. If we neglect addressing the darkness (i.e. those warning signs and shadows lurking in our periphery), while it may not be immediate, this heightens your company’s vulnerability. Case in point: what you don’t know can hurt you.
Identity & access management (IAM) is continuing to set new precedents in enterprise security. In the past we have seen countless breaches and hacks that have left many companies defenseless and vulnerable.
The proliferation of IoT devices has fueled the technological age we live in, but it's been at the expense of many corporate enterprise's data and sensitive information. With large-scale companies being breached almost daily, can you afford to be without the right IAM solutions?  It's important to pump the brakes on scalability to see how to effectively run an identity management solution that ...
Today’s environment warrants higher security and governance in the enterprise. From the proliferation of cloud-based systems and IoT, online connections are projected to be billions in upcoming years. With the increase in connections comes the inevitable increase of security breaches and hacks, however. Is your company prepared to handle this rapid-fire growth?
Well it should be, right? We all know that the real plot will be stopping a super-villain while racing high-powered cars and flashing beach bodies. But I heard the Wiz Khalifa song “See you again” this weekend and one of the memorable lines rang in my head:      “How can we not talk about family when family’s all that we got.” I couldn’t help applying an Identity Management consultant’s spin: