Identity and Access Management

Zombie accounts, also known as abandoned accounts, are user accounts left with no verifiable owner. This happens most often when someone leaves your company and their access to a certain application is never terminated. In a perfect world, the person that leaves you…

Read More

A great deal of time and effort can be saved during management reviews and audits by using an Intelligent IAM solution to provide reports, including filtering and drill-down capabilities, trend information, and data visualization tools. These not only give managers a high-level view…

Read More

Before I start, I need to come clean and tell you that I love enterprise software. Weird? Maybe. However, after working in the industry for many years and for many different companies, enterprise software is the basis for what drives business. Whether it’s…

Read More

Boston Children's Hospital needed help. One of the largest pediatric medical centers in the US, Boson Children's Hospital treats 30,000 patients each year. As a teaching hospital, they also received 500 new interns, twice a year and had the challenge of provisioning access rights…

Read More

Internships are becoming more and more necessary in order for college students to land a job straight out of college. In fact, over 85% of college students complete internships every year. With numbers like these, it’s quite possible that you have a few…

Read More

In a recent survey of LinkedIn users, privileged users pose the biggest threats to an organization (60%), followed closely by contractors and consultants (57%) and regular employees (51%). This shows us that our access credentials are more valuable than ever which means that being…

Read More

Imagine a world where the mundane parts of Identity and Access Management (IAM) are automated. We pass audits with ease. We don’t wake up in the middle of the night sweating about whether the right people have the right access. Our end users…

Read More

It’s no secret that healthcare organizations are constantly in the crosshairs of cyber criminals. One of the reasons healthcare records are 30 times more valuable than financial records is because they contain full identity profiles – including your social security number which is…

Read More

Did you know that one of the top nine attack types consistently covered in Verizon’s Data Breach Report are insider threats and privileged misuse? According to this year’s report, 66% of insiders steal information in hopes of selling it for cash, 17% are…

Read More

It’s amazing how much cyber-security has grown over the past few years. Where we were once worried about keystroke logging or Trojan horse attacks, we now face situations like ransomware and cyber warfare. User credentials are still the number one target for bad…

Read More