The search found 3760 results.
Blog
A new report on challenges faced by CISOs ranks IAM as a top concern and priority. Are you prepared to meet the identity and access needs of today?
Blog
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Blog
I’m sure you’re well aware that IAM stands for Identity and Access Management, so you’re probably wondering why I’m calling this an IAAM journey. I’ve added an extra “A” in here for Authorization, because it’s different than just Access. I’ve been asked a few times what I’d consider a complete IAAM suite and what are the steps that are needed to get there.
Blog
In case you missed part 0 in this series, you may want to brush up on how a good IAAM system should work before reading on.
________________________
The hardest part of standing up an IAAM system is around the people and process, not the technology. So, let’s start there because if we can’t get this done right, your IAAM project is going to fail.
Blog
Before you read, catch up on Part 0: An IAAM system overview and Part 1: Who does what.
Blog
Before you read, catch up on Part 0: An IAAM system overview and Part 1: Who does what.
Blog
Before you read, catch up on Part 0: An IAAM system overview, Part I: Who does what, Part II: Role Based Access Control the Unicorn of IAAM…or is it?, and Part III: What should I manage in my IDG system?.
Blog
Whether it’s a sticky note, a phone app, or keeping a password saved on your computer, we don’t always take all the precautions that we should to keep our password a secret from others.