November 2, 2020

SecureITsource Recognized as Admiral Delivery Partner with SailPoint

SecureITsource designated as a SailPoint Admiral Delivery Partner, joining an elite group of 10 delivery partners in the America’s!
November 2, 2020

Modern Identity: Unifying Identity to Improve the User Experience Across Your Ecosystem

The lines between users inside and outside your organization are blurring. Discover how modern organizations are consolidating and simplifying identity structures to provide all users the information they need, where and when they need it. Discover how to better identify each customer and their history with the company while providing employees with the access rights needed to deliver a fluid customer experience.
October 20, 2020

Take Care of the World’s Biggest Megaphone – Security for Managing Social Media Accounts

So, how should you approach managing social media accounts? What steps should you take? It depends. Using platforms like Facebook, Twitter, LinkedIn, TikTok, and Instagram looks different depending on whether you’re an individual influencer, a small team, or a large enterprise. The steps that you need to take to secure your accounts looks different depending on who you are too.
October 5, 2020
Image of hand navigating chess piece through conceptual maze

The Road to IAM Maturity Starts with These Five Steps

Watch 5 Steps to Achieve Identity & Access Management Maturity to learn about our IAM maturity model, how we developed it, and what sets us apart.
September 24, 2020
Man confused about how to handle duo admin passwords with cyberark

So you want to manage Duo Admin Console credentials using CyberArk?

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
September 15, 2020
Thumbnail of SecureITsource and CyberArk webinar "Lessons Learned: How to Successfully Address Endpoint Privilege"

Lessons Learned: How to Successfully Address Endpoint Privilege – Webinar

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
September 11, 2020
5 Steps to IAM Success Webinar Description

IAM Success in Five (Relatively) Easy Steps

Join SecureITsource on Sept. 16 at 2pm EDT for a webinar to learn the 5 steps to achieve identity and access management maturity.
August 14, 2020
Cocktails, Code, and Conversations

3 Ways to Monetize Identity and Access Management

3 Ways to Monetize Identity and Access Management - How establishing an #IAM program can help you bring both security and revenue into the business. #cybersecurity #ITsecurity #identityandaccess
August 13, 2020
Secureitsource and Seczetta

SecZetta & SecureITsource – The Missing Link to Mastering a Modern Identity Program

In this webinar, our Senior Director of IAM Strategy at SecureITsource, Jonathan Edwards, speaks with Paul DeGraaf, industry-renowned IAM expert (Weight Watchers, AIG, DTCC), and Cassie […]
June 11, 2020

Using SSO & MFA for Secure Remote Access: If not now, when?

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource As organizations scrambled to get remote workforces up and running over the past several months, companies saw their […]
June 5, 2020
3 Keys to Identity and Access Management Success with Okta

3 Keys to Identity and Access Management Success with Okta – Webinar

Hear what our Okta experts have to say about how to use Okta in a successful Identity and Access Management program. Current best practices Lessons learned […]
May 26, 2020
Discover the Three Keys to IAM Success with Okta

Discover the Three Keys to IAM Success with Okta

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource Creating Productive and Secure Work from Home Environments By now we are all aware of the extensive effects […]
November 2, 2020

SecureITsource Recognized as Admiral Delivery Partner with SailPoint

SecureITsource designated as a SailPoint Admiral Delivery Partner, joining an elite group of 10 delivery partners in the America’s!
October 20, 2020

Take Care of the World’s Biggest Megaphone – Security for Managing Social Media Accounts

So, how should you approach managing social media accounts? What steps should you take? It depends. Using platforms like Facebook, Twitter, LinkedIn, TikTok, and Instagram looks different depending on whether you’re an individual influencer, a small team, or a large enterprise. The steps that you need to take to secure your accounts looks different depending on who you are too.
October 5, 2020
Image of hand navigating chess piece through conceptual maze

The Road to IAM Maturity Starts with These Five Steps

Watch 5 Steps to Achieve Identity & Access Management Maturity to learn about our IAM maturity model, how we developed it, and what sets us apart.
September 11, 2020
5 Steps to IAM Success Webinar Description

IAM Success in Five (Relatively) Easy Steps

Join SecureITsource on Sept. 16 at 2pm EDT for a webinar to learn the 5 steps to achieve identity and access management maturity.
August 14, 2020
Cocktails, Code, and Conversations

3 Ways to Monetize Identity and Access Management

3 Ways to Monetize Identity and Access Management - How establishing an #IAM program can help you bring both security and revenue into the business. #cybersecurity #ITsecurity #identityandaccess
May 26, 2020
Discover the Three Keys to IAM Success with Okta

Discover the Three Keys to IAM Success with Okta

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource Creating Productive and Secure Work from Home Environments By now we are all aware of the extensive effects […]
August 6, 2019
fingerprint-integrated-in-a-printed-circuit

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because […]
April 25, 2019
considering-the-big-picture

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained […]
April 9, 2019
young-businessmen-discussing-document

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity […]