April 2, 2020
meeting-writing-at-flipchart

Using Okta to Unify and Simplify Your Identity Program

Identity programs have become more and more complex over time, preventing organizations from managing their users and systems in simple, consistent ways. At SecureITsource, we partner […]
March 31, 2020
laptop-at-home

Making Work from Home Transition Easy and Free

By Ken Stone, CEO The ongoing events surrounding COVID-19 have had a more far-reaching impact than many of us could have imagined. The sudden shift to […]
September 13, 2019
cloud-computing-data-security

CyberArk EPM – Culture Shifts in Security Implementation

Rahsaan Knights, Consultant, SecureITsource, Inc.   Introduction CyberArk Endpoint Privilege Manager is the authority in endpoint group policy management, with an ever-growing toolset used to empower […]
August 6, 2019
fingerprint-integrated-in-a-printed-circuit

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because […]
June 6, 2019
sharing-ideas

Your Identity Delivery Partner’s Culture Is Important to You – Here’s Why

Jonathan Edwards, Director of IAM Strategy, SecureITsource, Inc. You have spent months researching, conducting assessments, identifying requirements, watching demos or performing Proof of Concepts (PoC), and […]
April 25, 2019
considering-the-big-picture

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained […]
April 9, 2019
young-businessmen-discussing-document

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity […]
March 29, 2019
it-consultant-pointing-something-out-on-screen

Gaining Control of Runaway Administrator Accounts Using the CyberArk Privileged Access Solution

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. One of the hardest types of accounts to gain control of is the privileged administrator account. Every Windows system […]
February 21, 2019

Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   […]
December 20, 2018

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model […]
November 19, 2018

You’re More Susceptible to Social Engineering Than You Think

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. In today’s world of technology, Social Engineering is a common topic. Many articles and websites are devoted to the […]
November 13, 2018

Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of […]