April 20, 2020
considering-the-big-picture

Case Study: Operational Excellence Meets Sarbanes-Oxley

By: Gage Heeringa, Kevin Converse, Jonathan Llovet, Consultants, SecureITsource, Inc. Summary Our client is a leader in healthcare technology, handling billions of healthcare transactions annually. With […]
April 2, 2020
vintage-light-lamp

Why Do Identity Programs Fail?

SecureITsource Co-Founder and Principal David Mattos talks with us about some of the issues that can arise in an Identity Program and make them fail. Do […]
April 2, 2020
team-working-at-board

Building a Roadmap – SecureITsource CEO Ken Stone on the Identity Program Journey

Just starting your identity program? Already have one, but trying to figure out how to handle solutions that don’t fit your strategy anymore? Ken Stone, President […]
April 2, 2020
cyber-key

The Future of Identity – Four Trends That Will Change Your Organization’s IAM Program

Director of Identity and Access Management (IAM) Strategy Jonathan Edwards talks with us about the four major trends he sees in Identity and where organizations will […]
April 2, 2020
man-working-at-desk-at-night-with-city-backgroun

Helping You Reach Maturity in Identity Management

SecureITsource helps our clients to envision, design, and deploy successful IAM Programs. In order to better understand the IAM Journey, we have developed a Maturity Model […]
April 2, 2020
meeting-writing-at-flipchart

Using Okta to Unify and Simplify Your Identity Program

Identity programs have become more and more complex over time, preventing organizations from managing their users and systems in simple, consistent ways. At SecureITsource, we partner […]
March 31, 2020
laptop-at-home

Making Work from Home Transition Easy and Free

By Ken Stone, CEO The ongoing events surrounding COVID-19 have had a more far-reaching impact than many of us could have imagined. The sudden shift to […]
September 13, 2019
cloud-computing-data-security

CyberArk EPM – Culture Shifts in Security Implementation

Rahsaan Knights, Consultant, SecureITsource, Inc.   Introduction CyberArk Endpoint Privilege Manager is the authority in endpoint group policy management, with an ever-growing toolset used to empower […]
August 6, 2019
fingerprint-integrated-in-a-printed-circuit

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because […]
June 6, 2019
sharing-ideas

Your Identity Delivery Partner’s Culture Is Important to You – Here’s Why

Jonathan Edwards, Director of IAM Strategy, SecureITsource, Inc. You have spent months researching, conducting assessments, identifying requirements, watching demos or performing Proof of Concepts (PoC), and […]
April 25, 2019
considering-the-big-picture

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained […]
April 9, 2019
young-businessmen-discussing-document

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity […]