The Identropy Blog

Your Security is at Risk Just by Someone Knowing Your Cell Phone Number

Posted by Identropy on Apr 29, 2016 10:00:00 AM

The stuff of nightmares is no longer the boogeyman or Bloody Mary--it’s mutated into hackers, thieves and crooks. An article from theguardian shows how a known hack dated back to 2014 is still very much in motion.

All they need is your phone number, and nothing else.

Regardless of carrier, with no remedy besides turning your phone off, this hack uses Signaling System No. 7 (SS7), a network interchange service, which “acts as a broker between mobile phone networks.”

Read More

Topics: IAM

Why Identity Management for Healthcare is a Necessity

Posted by Identropy on Apr 27, 2016 2:00:00 PM

The healthcare industry has been riddled with security and HIPAA breaches, especially since electronic medical records have become a major contender and requirement in more and more doctor’s offices.

With this increased need for security has come a demand for better identity management.

As noted by the Electronic Health Reporter, Vice President of healthcare for LexisNexis Harry Jordan has said the most important question is not “Who are you?” but  “What do we need to know about you?”

Read More

Topics: Identity Management

How to Run an IAM Program

Posted by Jim McDonald on Apr 21, 2016 8:00:00 AM

I sometimes think of the discipline of IAM Program Governance as PPnT - “people, process, and no technology.” 

It is the least technical part of the IAM leader’s job. Really IAM Governance includes a few disciplines:

Operating Model (PBR)

At Identropy, we’ve been talking about “Plan, Build, Run”  (PBR) for a long time. I have been thrilled lately to see how many of our clients have embraced PBR in their IT organizations.

PBR is a wonderful operating model and fits really cleanly as a framework for IAM governance and organization.

Read More

Topics: IAM Program

[New Case Study] Healthcare Case Study

Posted by Identropy on Apr 19, 2016 8:00:00 AM

The Internet has spawned a huge increase in connected devices that has permanently changed the way we interact--this is especially true in the healthcare sector. With each connection comes an added risk for breaches of security and important data. 

Many companies don't have the arsenal to manage enterprise IAM, and hence look to advisory and consulting firms for further assistance.

One such example is a healthcare association that has worked alongside Identropy to improve their IT footprint and enterprise architecture goals.

Read More

Topics: IAM solution

Why a Holistic Security Approach Can Help Your Enterprise

Posted by Identropy on Apr 15, 2016 8:00:00 PM

Many events, current and otherwise, have changed the way we look at security.

From the recent Panama Papers scandal to companies investing considerable assets into security (Microsoft being one, who’s invested $1 billion from 2014-2015), it’s obvious there’s a need to integrate strategies throughout an entire enterprise, and not just patches.

Read More

Topics: security

What’s the Buzz With Cloud-Based Identity Management?

Posted by Identropy on Apr 12, 2016 8:00:00 AM

If you’ve been on the Internet at all in the past few years, you’ve probably seen some hum or buzz about the “cloud” or “cloud-based” programs. It basically means hosting data through the Internet and not through physical hardware.

This bypass of hardware results in more convenient (and unprecedented) enterprise solutions that have changed the way we do business.

Read More

Topics: cloud identity management, Cloud Identity

[Video] Identity 101: Passwords, Hashing and Encoding

Posted by Mario Dusaj on Apr 8, 2016 9:58:42 AM

When working with passwords, many times people in the industry use the terms encryption, passwords, hashing and encoding interchangeably--but in reality, they are quite different. There's a time and a place to use each. 

Read More

Topics: passwords

Do not Pass go, do not Wait to Create an IAM Gameplan

Posted by Identropy on Apr 5, 2016 8:00:00 AM

Everyone loves a game of Monopoly, right? That is, unless the odds are turned against you, and suddenly your nemesis has acquired Boardwalk and all the Railroads after 5+ hours of gameplay.

It’s happened all too often.

It’s difficult to turn the game in your favor when this occurs--mainly because having the right strategy and gameplan, and being able to deal with chance, is the linchpin to winning Monopoly.

The very same can be said about identity and access management (IAM):

Read More

Topics: Identity Management, IAM

How Bad IAM Can Ruin Your Life

Posted by Identropy on Mar 30, 2016 8:00:00 AM

Because identity and access management (IAM) is what we do, and all we do, we know how important it is for businesses today.

In fact, it’s become so pivotal that not having it can be detrimental to an organization.

Case in point: bad IAM can ruin lives--quite literally.

Read More

Topics: IAM, Identity

The Importance of People in an Identity Management Strategy

Posted by Identropy on Mar 25, 2016 10:00:00 AM


The identity and access management (IAM) industry spends so much time talking about how technology is the key to unlocking your enterprise’s potential-- and while that’s certainly part of it -- we’re overlooking something very important in the process: People.

No IAM program could be fully conceptualized or realized without a leader in the form of a CIO, CISO, a Program Manager or otherwise taking the first step.

Read More

Topics: Identity Management

Subscribe by Email