The search found 3760 results.
Blog
In case you missed part 0 in this series, you may want to brush up on how a good IAAM system should work before reading on.
________________________
The hardest part of standing up an IAAM system is around the people and process, not the technology. So, let’s start there because if we can’t get this done right, your IAAM project is going to fail.
Blog
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey. I’ve added an extra “A” in here for Authorization, because it’s different than just Access. I’ve been asked a few times what I’d consider a complete IAAM suite and what are the steps that are needed to get there.
Press
Imprivata to strengthen Identity and Access Management Platform for the enterprise
Blog
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.