The Identropy Blog

Why Identity Management Consulting Matters in 100 Words

Posted by Identropy on May 17, 2016 8:00:00 AM

We all try to do as much as we can on our own, but sometimes, help is needed to get the job done the right way, in the right amount of time. This is why a consultant can be a valuable asset for your identity management enterprise efforts and other initiatives.

Read More

Topics: Identity Management

What Companies are Most Vulnerable to Hacker Attacks?

Posted by Identropy on May 10, 2016 8:00:00 AM

When you think of companies being hacked, which are some of the first that come to mind that are most vulnerable to hacker attacks?

We may be quick to point the finger at big corporations, but it’s not just them that are being targeted--small companies are just as viable to hackers, or “the bad guys.”

This should come as no surprise.

Last year’s Duke University/CFO Magazine Global Business Outlook Survey, indicated that over 80% of U.S. companies’ systems “have been successfully hacked in an attempt to steal, change or make public important data.”

Read More

Topics: IAM

Are You Truly Safe With a Smart Home?

Posted by Identropy on May 6, 2016 9:35:02 AM

Most things that took computer access years ago are now able to be done with a few finger taps of a smartphone: Checking our account balance, making a car payment, and even monitoring blood sugar, to name a few.

But in the last few years, many have integrated smart homes into their everyday lives: Climate control; monitoring door and window locks; video surveillance… the future is now, many say, with having this connected access at the tap of a finger.

Read More

Topics: security

Your Security is at Risk Just by Someone Knowing Your Cell Phone Number

Posted by Identropy on Apr 29, 2016 10:00:00 AM

The stuff of nightmares is no longer the boogeyman or Bloody Mary--it’s mutated into hackers, thieves and crooks. An article from theguardian shows how a known hack dated back to 2014 is still very much in motion.

All they need is your phone number, and nothing else.

Regardless of carrier, with no remedy besides turning your phone off, this hack uses Signaling System No. 7 (SS7), a network interchange service, which “acts as a broker between mobile phone networks.”

Read More

Topics: IAM

Why Identity Management for Healthcare is a Necessity

Posted by Identropy on Apr 27, 2016 2:00:00 PM

The healthcare industry has been riddled with security and HIPAA breaches, especially since electronic medical records have become a major contender and requirement in more and more doctor’s offices.

With this increased need for security has come a demand for better identity management.

As noted by the Electronic Health Reporter, Vice President of healthcare for LexisNexis Harry Jordan has said the most important question is not “Who are you?” but  “What do we need to know about you?”

Read More

Topics: Identity Management

How to Run an IAM Program

Posted by Jim McDonald on Apr 21, 2016 8:00:00 AM

I sometimes think of the discipline of IAM Program Governance as PPnT - “people, process, and no technology.” 

It is the least technical part of the IAM leader’s job. Really IAM Governance includes a few disciplines:

Operating Model (PBR)

At Identropy, we’ve been talking about “Plan, Build, Run”  (PBR) for a long time. I have been thrilled lately to see how many of our clients have embraced PBR in their IT organizations.

PBR is a wonderful operating model and fits really cleanly as a framework for IAM governance and organization.

Read More

Topics: IAM Program

[New Case Study] Healthcare Case Study

Posted by Identropy on Apr 19, 2016 8:00:00 AM

The Internet has spawned a huge increase in connected devices that has permanently changed the way we interact--this is especially true in the healthcare sector. With each connection comes an added risk for breaches of security and important data. 

Many companies don't have the arsenal to manage enterprise IAM, and hence look to advisory and consulting firms for further assistance.

One such example is a healthcare association that has worked alongside Identropy to improve their IT footprint and enterprise architecture goals.

Read More

Topics: IAM solution

Why a Holistic Security Approach Can Help Your Enterprise

Posted by Identropy on Apr 15, 2016 8:00:00 PM

Many events, current and otherwise, have changed the way we look at security.

From the recent Panama Papers scandal to companies investing considerable assets into security (Microsoft being one, who’s invested $1 billion from 2014-2015), it’s obvious there’s a need to integrate strategies throughout an entire enterprise, and not just patches.

Read More

Topics: security

What’s the Buzz With Cloud-Based Identity Management?

Posted by Identropy on Apr 12, 2016 8:00:00 AM

If you’ve been on the Internet at all in the past few years, you’ve probably seen some hum or buzz about the “cloud” or “cloud-based” programs. It basically means hosting data through the Internet and not through physical hardware.

This bypass of hardware results in more convenient (and unprecedented) enterprise solutions that have changed the way we do business.

Read More

Topics: cloud identity management, Cloud Identity

[Video] Identity 101: Passwords, Hashing and Encoding

Posted by Mario Dusaj on Apr 8, 2016 9:58:42 AM

When working with passwords, many times people in the industry use the terms encryption, passwords, hashing and encoding interchangeably--but in reality, they are quite different. There's a time and a place to use each. 

Read More

Topics: passwords

Subscribe by Email