Access

A stethoscope on a clipboard, showing the significance of IAM in patient data protection

Healthcare Identity Access Management: A Complete Guide to Securing Patient Data and Systems

Healthcare organizations face unprecedented challenges in managing digital identities while maintaining compliance with strict regulatory requirements. Healthcare identity access management (IAM) has become a critical component of modern medical infrastructure, protecting sensitive patient information while ensuring authorized personnel have seamless access to the systems they need. Executive Summary Healthcare IAM has moved from a backend […]

Healthcare Identity Access Management: A Complete Guide to Securing Patient Data and Systems Read More »

Employees working in a smart office with holographic data interfaces representing real-time access, monitoring, and identity governance

How to Select an Enterprise Identity Management Solution: A Comprehensive Guide

In an era where digital security is paramount, selecting the right Enterprise Identity Access Management (IAM) solution is crucial for safeguarding organizational assets. This comprehensive guide equips high-level business decision-makers with essential considerations, frequently asked questions, and a balanced evaluation of the benefits and drawbacks of various IAM solutions. Empower your organization to make informed

How to Select an Enterprise Identity Management Solution: A Comprehensive Guide Read More »

Industrial IOT Platforms

Identity and Access Management Platforms: Your All-in-One Guide

In the evolving landscape of cybersecurity, Identity and Access Management (IAM) platforms play a crucial role in safeguarding sensitive information and ensuring seamless user experiences. This article delves into the diverse array of identity access management solutions available, highlighting their unique features, advantages, and potential limitations. By providing a comprehensive overview, readers will gain valuable

Identity and Access Management Platforms: Your All-in-One Guide Read More »

Least Privilege access

DoD’s XaaS Identity Risks: Securing Innovation at Scale

The DoD’s XaaS Gamble: Why Identity is the First and Most Critical Service to Get Right Before delivering “Anything-as-a-Service,” ensure you aren’t exposing Everything-as-a-Risk. The Future Arrived Fast And Brought Its Own Security Shadow It started with a success. A new logistics tool was deployed via a Defense agency’s XaaS initiative… faster than anything they’d

DoD’s XaaS Identity Risks: Securing Innovation at Scale Read More »

PIV-D needs to die. But then what?

Identity access management is the first layer for any viable zero-trust strategy, as it should be. The NIST 800-63-4 Digital Identity Guidelines revision coming out in draft at the end of the year should accommodate innovative authenticators while maintaining HSPD-12 security and interoperability goals and encourage stronger, centralized identity management. Hopefully, that means PIV-D will

PIV-D needs to die. But then what? Read More »

Identity Management is More Important than CISOs Think

How important is identity management and authentication for securing Federal networks? It depends on who you ask.  If you ask me, it’s critical. The fact is, the perimeter is no longer the enterprise network firewall. Rather the identity of every person or device accessing corporate workloads and data. Ask Federal IT decision makers, and they

Identity Management is More Important than CISOs Think Read More »

This Week’s White House Multifactor Authentication Symposium

When the White House hosted its symposium on modernizing authentication earlier this week, our team was pleased to participate as thought leaders contributing our thoughts on the last 20 years of HSPD12 and Identity Management in the US Federal Government. This discussion marked a significant milestone as pioneers in simple, secure, user-friendly multifactor authentication. Let’s

This Week’s White House Multifactor Authentication Symposium Read More »

No BeyondCorp or ZeroTrust Without the Fundamentals

Last night I went to the local ISACA event where Google was talking about their 6-year journey towards their BeyondCorp / ZeroTrust model for security. As we move away from the traditional walled castle of security design to support the federated SaaS and cloud provider models I genuinely believe BeyondCorp is the best solution to

No BeyondCorp or ZeroTrust Without the Fundamentals Read More »

Oracle Exadata 1/8 Rack vs. Oracle Database Appliance ODA

We do a lot of work with the Oracle Identity and Access Management Suite and many of our customers do not have a ton of experience with the Oracle Database, nor do they want a huge Oracle infrastructure.  What they do want is high availability and reliability on the platforms underpinning their IAM solutions.  Over

Oracle Exadata 1/8 Rack vs. Oracle Database Appliance ODA Read More »

Fun Times Integrating SharePoint with Oracle Entitlements Server (Part One)

These are the battle scars we talk about.  We gladly take them in the interest of learning and getting better. A few months ago I began a proof-of-concept effort to use OES 11gR2 as a fine grained policy decision point for Microsoft Office SharePoint (MOSS) 2010.  Site or page level authorization simply doesn’t cut it

Fun Times Integrating SharePoint with Oracle Entitlements Server (Part One) Read More »