Access Governance Suite

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
120
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
112
Score:
Unrated

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Travis Greene
Nov 20, 2015
4:38 pm
Reads:
879
Score:
Unrated

Nobody likes boring. Projects described with words like infrastructure, maintenance, compliance or governance are boring. Anyone that works on these projects does so with much discontentedness. Our neglect of all things boring is becoming an epidemic. Just check out this fantastically entertaining segment from John Oliver’s Last Week Tonight on a few brave auditors “willing…

+ read more

Amie Johnson
Jun 22, 2015
5:57 pm
Reads:
1,807
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
1,593
Score:
Unrated

The 2014 Global Economic Crime Survey conducted by PwC shares a startling statistic about cyberattacks: “seven percent of U.S. organizations lost $1 million or more due to cybercrime incidents in 2013, compared with three percent of global organizations; furthermore, 19 percent of U.S. entities reported financial losses of $50,000 to $1 million, compared with eight…

+ read more

Travis Greene
May 21, 2015
10:04 am
Reads:
1,643
Score:
Unrated

If someone really needs to do something, they will find a way to do it. The wheel. Nails. The compass. Paper. The printing press. Light bulbs. Computers. The Internet. Running your own email server as the US Secretary of State. In the last 40 years, I don’t think there is a business person on the…

+ read more

Rhonda Holloway
Mar 17, 2015
9:02 am
Reads:
2,412
Score:
Unrated

There are a few things you can do to achieve greater efficacy during your next access certification campaign that don’t require a Superbowl-ad-sized budget. Here are some tips to consider to make your next access certification truly effective.

Amie Johnson
Jan 29, 2015
5:16 pm
Reads:
1,627
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow