Leveraging Zero Trust with Identity at the Core

zero trust

Learn how you can leverage the Zero Trust Model to better protect your organization. The Changing Business Landscape The Covid-19 pandemic has made working from home the new norm, which has made it clear that the traditional concept of a well-defined network perimeter can’t be relied upon anymore for cybersecurity. A perimeter-centric defense where everyone […]

How Identity Governance Administration (IGA) Helps Protect Intellectual Property

Identity Governance Administration

Identity Governance Administration (IGA) solutions are designed to evaluate and enforce security policies to manage user access and protect sensitive information.  Protecting intellectual property and trade secrets has been a key driver of competitive advantage; however, protecting these vital assets has become more challenging as technology has evolved. In the age of Digital Transformation, it […]

Five Identity Governance Best Practices

identity governance best practices

Jim Marshall shares five identity governance best practices to help build a successful IGA program. Implementing Identity Governance presents a variety of initiatives and choices, and these projects tend to have similar pitfalls and problems. Over time, lessons learned have become the benchmark for success. Applying best practice means learning from the experience of others […]

Seven Goals for Identity Governance Success

identity governance

Jim Marshall shares seven areas to consider when defining your Identity Governance goals and objectives. Where should you start with your Identity Governance project? Perhaps the goals have already been established by your key stakeholders. Possibly it’s a compliance initiative driven by regulations such as PCI DSS, SOX, HIPAA, or GDPR. Or you know that […]

Highlights from Gartner IAM Summit 2019 #GartnerIAM

gartner iam summit 2019

Last week, the Idenhaus team joined almost 2,000 Identity and Access Management experts, vendors, and practitioners at the annual Gartner IAM Summit in Las Vegas. This is our third year attending the event and, as always, we found immense value in the educational tracks and networking opportunities. This year’s conference theme was “Keys to IAM […]

8 Must-Read Identity Management & Cybersecurity Articles, September 2019

identity management and cybersecurity articles

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here or the […]

Idenhaus Biweekly: Systems Thinking, Neglecting IGA, and Healthcare Cybersecurity

Idenhaus Biweekly

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Identity Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought […]

Why Your Organization Needs an IAM Roadmap

why-you-need-IAM-roadmap-idenhaus

Hanno Ekdahl, founder of Idenhaus Consulting, provides an overview of why your organization needs an IAM Roadmap prior to kicking off any Identity Management project. Did you know that over half of all Identity Management projects fail the first time? And, even when they are successful, 4 out of 5 executives say they are not […]

8 Insightful Identity Governance & GDPR Articles, April 2019

insightful identity governance articles idenhaus

Thanks for reading our biweekly roundup of insightful Identity Governance & Cybersecurity articles. We curate a diverse selection of IAM, GDPR, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   GDPR Overview with Jodi Daniels, Privacy Consultant via Idenhaus GDPR is the most important change in data […]

6 Common Role Based Access Control (RBAC) Implementation Pitfalls

6-Common-RBAC-Implementation-Pitfalls_600x400

Role based access control (RBAC) has been around for a long time, but that doesn’t mean it’s easy to implement. People prefer to talk about the benefits of this access control model, so today we are going to be contrarian and talk about six common RBAC implementation pitfalls. To learn more about this topic, you […]