Why IDM is the Secret to Creating the Onboarding of the Future


Automation is the key to making the onboarding process—a critical business process—work for your organization. But how do you decide what parts of the process are worth the effort to automate? You start by making a list of the critical elements—access rights and assets—that employees and contractors need to start work. Not all departments will agree […]

How to Connect HR Processes to Identity Management, Part 1

In our previous blog Connecting Human Resource Process and Data to Identity Management, we outlined the fundamental principles of creating a smooth on/off-boarding process for employees and contractors. Wasteful and inefficient on-boarding processes cost companies time, effort, and money. They also cost employee goodwill; employees come to despise processes that don’t work or that don’t […]

Connecting Human Resource Process and Data to Identity Management


Identity & Access Management (IAM) was first imagined as a centralized platform that would manage user access throughout the entire employee lifecycle, from hire to separation. IAM was designed to automate routine administrative tasks like creating user accounts and giving employees application access, all in a platform that also incorporated the business’s unique rules, policies, […]

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit

Idenhaus recently attended AIG and Axio’s Executive Risk Summit, which brought together a panel of insurance experts to discuss Cyber Risk management. Cyber exposures are expanding rapidly as businesses move their IT systems to the cloud and adopt the Internet of Things (IoT) and Bring Your Own Device (BYOD). These changes introduce fundamental new threats to businesses of […]