Protect Your Online Identity With These Expert Tips By Idenhaus Consulting

From an interview with Hanno Ekdahl and SafetyDetectives It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk In fact, organizations embracing digital transformation must also understand the cybersecurity risks that come with it, like data […]

Policy vs Standards vs Procedures

How can we ensure that employees and individuals inside any business use technology in the manner that the organization expects? Previously, we discussed Why Every Organization Needs Information Security Policies. Any business will take steps to secure its information assets; and how that business will do so should be documented and described in their information […]

Understanding Common IDM Implementation Pitfalls

Understanding Common IDM Implementation Pitfalls

Hanno Ekdahl shares common IDM Implementation Pitfalls that organizations should avoid if they want a successful IDM launch, the first time around.   Did you know that over 50 percent of IDM projects fail the first time around? While Identity Management solutions offer a large range of benefits for organizations, the implementation of these solutions […]

Mini Case Study: Getting a Handle on User Data

getting-handle-user-data_Idenhaus-Consulting

Nicole Keaton Hart and Hanno Ekdahl share a mini case study on the importance of establishing a system of record to maintain user data quality.   Identity Management (IAM) is built around the concept of a system of record and establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively […]

Idenhaus Biweekly: Access Management, GDPR Compliance, and Blockchain-Based IAM

access management

Thanks for reading the Idenhaus biweekly digest of insightful Access Management, GDPR compliance, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   What You Need to Know About GDPR Compliance via Idenhaus Senior privacy consultant Jodi Daniels shares why […]

Why Your Organization Needs an IAM Roadmap

why-you-need-IAM-roadmap-idenhaus

Hanno Ekdahl, founder of Idenhaus Consulting, provides an overview of why your organization needs an IAM Roadmap prior to kicking off any Identity Management project. Did you know that over half of all Identity Management projects fail the first time? And, even when they are successful, 4 out of 5 executives say they are not […]

8 Insightful Identity Governance & GDPR Articles, April 2019

insightful identity governance articles idenhaus

Thanks for reading our biweekly roundup of insightful Identity Governance & Cybersecurity articles. We curate a diverse selection of IAM, GDPR, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   GDPR Overview with Jodi Daniels, Privacy Consultant via Idenhaus GDPR is the most important change in data […]

6 Common Role Based Access Control (RBAC) Implementation Pitfalls

6-Common-RBAC-Implementation-Pitfalls_600x400

Role based access control (RBAC) has been around for a long time, but that doesn’t mean it’s easy to implement. People prefer to talk about the benefits of this access control model, so today we are going to be contrarian and talk about six common RBAC implementation pitfalls. To learn more about this topic, you […]

7 Must-Read Identity Governance & Cybersecurity Articles, April 2019

Thanks for reading our biweekly roundup of Identity Governance & Cybersecurity newsbites. We curate a diverse selection of IAM, IGA, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   Why Organizations Need an RBAC Security Model via Idenhaus In this post, we discuss why organizations implement role […]

8 Must-Read Articles on Identity Governance & Access Management

Identity Governance and Access Management

Thanks for reading our biweekly digest of Identity Governance, Cybersecurity, and Access Management articles. We curate a diverse selection of IdM, IGA, privacy, and cybersecurity articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 8 informative identity governance and access management articles from late January 2019. Enjoy! […]