Mini Case Study: Getting a Handle on User Data

getting-handle-user-data_Idenhaus-Consulting

Nicole Keaton Hart and Hanno Ekdahl share a mini case study on the importance of establishing a system of record to maintain user data quality.   Identity Management (IAM) is built around the concept of a system of record and establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively […]

7 Must-Read Cybersecurity Articles, July 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Learn how to overcome common data quality problems in our upcoming webinar on July 20, 2018, at 12 […]

Mastering Identity Management: The Data Quality Divide

Data quality in HRIS systems can be defined in a number of ways and will have a significant impact on how Identity and Access Management (IAM) solutions work in the organization and how data quality is managed across the IT environment. From HR or business operations perspective, data is often evaluated based on whether it […]

7 Must-Read Identity & Access Management Articles, June 2018

data-identity-management

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Many organizations experience the hidden costs of low-quality user data, which makes automating routine Identity Management […]

How Your HR Processes Drive Data Quality

Data Quality Process metrics

Did you know that HR processes drive most of the Identity Management lifecycle for employees and contractors? These processes have a direct impact on how effective an organization is at managing user access and, to a large extent, productivity. As organizations grow and need to function at scale, small defects in the process can lead to […]

Why Identity Management Success Depends on Good Data Quality

identity-iam-data-quality-idenhaus

It has been said that IT systems are a lot like the Old Testament, lots of rules and no mercy! Identity Management solutions are no different because they process data according to defined rules that grant and revoke user access to the network and key applications. If there is bad data in the IAM system, users cannot get […]

Avoid this Crippling Multi-Factor Authentication Security Mistake

Did you know 63 percent of confirmed data breaches involved leveraging weak, stolen, or default passwords? The traditional combination of username and password to login to a system offers limited protection from hackers. In an effort to shore up security and protect sensitive data, many organizations are implementing multi-factor authentication (MFA). The idea behind MFA is […]

3 Must-Take Steps to Getting User Data Right

Maintaining data quality is the single most important principle of a functioning Identity Management solution. In fact, realizing the benefits of automated user provisioning and access management processes depends on it. Unfortunately, there is a huge performance penalty for getting the data wrong that users will not accept – putting your IAM program at risk […]

Defining Roles: The Top-Down Process in Practice

Roles Definition- Part I

Our path to well-defined roles begins with the system owner who evaluates the applications and which users should have access. When he determines that a group does not belong, for example, the accounting folks should not be on a particular application or system, he removes them…All of them. This first pass eliminates users who should […]

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data […]