October 5, 2020
Image of hand navigating chess piece through conceptual maze

The Road to IAM Maturity Starts with These Five Steps

Watch 5 Steps to Achieve Identity & Access Management Maturity to learn about our IAM maturity model, how we developed it, and what sets us apart.
October 20, 2020

Take Care of the World’s Biggest Megaphone – Security for Managing Social Media Accounts

So, how should you approach managing social media accounts? What steps should you take? It depends. Using platforms like Facebook, Twitter, LinkedIn, TikTok, and Instagram looks different depending on whether you’re an individual influencer, a small team, or a large enterprise. The steps that you need to take to secure your accounts looks different depending on who you are too.
September 24, 2020
Man confused about how to handle duo admin passwords with cyberark

So you want to manage Duo Admin Console credentials using CyberArk?

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
September 15, 2020
Thumbnail of SecureITsource and CyberArk webinar "Lessons Learned: How to Successfully Address Endpoint Privilege"

Lessons Learned: How to Successfully Address Endpoint Privilege – Webinar

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
September 11, 2020
5 Steps to IAM Success Webinar Description

IAM Success in Five (Relatively) Easy Steps

Join SecureITsource on Sept. 16 at 2pm EDT for a webinar to learn the 5 steps to achieve identity and access management maturity.
August 14, 2020
Cocktails, Code, and Conversations

3 Ways to Monetize Identity and Access Management

3 Ways to Monetize Identity and Access Management - How establishing an #IAM program can help you bring both security and revenue into the business. #cybersecurity #ITsecurity #identityandaccess
August 13, 2020
Secureitsource and Seczetta

SecZetta & SecureITsource – The Missing Link to Mastering a Modern Identity Program

In this webinar, our Senior Director of IAM Strategy at SecureITsource, Jonathan Edwards, speaks with Paul DeGraaf, industry-renowned IAM expert (Weight Watchers, AIG, DTCC), and Cassie […]
June 11, 2020

Using SSO & MFA for Secure Remote Access: If not now, when?

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource As organizations scrambled to get remote workforces up and running over the past several months, companies saw their […]
June 5, 2020
3 Keys to Identity and Access Management Success with Okta

3 Keys to Identity and Access Management Success with Okta – Webinar

Hear what our Okta experts have to say about how to use Okta in a successful Identity and Access Management program. Current best practices Lessons learned […]
May 26, 2020
Discover the Three Keys to IAM Success with Okta

Discover the Three Keys to IAM Success with Okta

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource Creating Productive and Secure Work from Home Environments By now we are all aware of the extensive effects […]
April 20, 2020
considering-the-big-picture

Case Study: Operational Excellence Meets Sarbanes-Oxley

By: Gage Heeringa, Kevin Converse, Jonathan Llovet, Consultants, SecureITsource, Inc. Summary Our client is a leader in healthcare technology, handling billions of healthcare transactions annually. With […]
April 2, 2020
vintage-light-lamp

Why Do Identity Programs Fail?

SecureITsource Co-Founder and Principal David Mattos talks with us about some of the issues that can arise in an Identity Program and make them fail. Do […]