September 11, 2020
5 Steps to IAM Success Webinar Description

IAM Success in Five (Relatively) Easy Steps

Join SecureITsource on Sept. 16 at 2pm EDT for a webinar to learn the 5 steps to achieve identity and access management maturity.
September 15, 2020
Thumbnail of SecureITsource and CyberArk webinar "Lessons Learned: How to Successfully Address Endpoint Privilege"

Lessons Learned: How to Successfully Address Endpoint Privilege – Webinar

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
August 14, 2020
Cocktails, Code, and Conversations

3 Ways to Monetize Identity and Access Management

3 Ways to Monetize Identity and Access Management - How establishing an #IAM program can help you bring both security and revenue into the business. #cybersecurity #ITsecurity #identityandaccess
August 13, 2020
Secureitsource and Seczetta

SecZetta & SecureITsource – The Missing Link to Mastering a Modern Identity Program

In this webinar, our Senior Director of IAM Strategy at SecureITsource, Jonathan Edwards, speaks with Paul DeGraaf, industry-renowned IAM expert (Weight Watchers, AIG, DTCC), and Cassie […]
June 11, 2020

Using SSO & MFA for Secure Remote Access: If not now, when?

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource As organizations scrambled to get remote workforces up and running over the past several months, companies saw their […]
June 5, 2020
3 Keys to Identity and Access Management Success with Okta

3 Keys to Identity and Access Management Success with Okta – Webinar

Hear what our Okta experts have to say about how to use Okta in a successful Identity and Access Management program. Current best practices Lessons learned […]
May 26, 2020
Discover the Three Keys to IAM Success with Okta

Discover the Three Keys to IAM Success with Okta

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource Creating Productive and Secure Work from Home Environments By now we are all aware of the extensive effects […]
April 20, 2020
considering-the-big-picture

Case Study: Operational Excellence Meets Sarbanes-Oxley

By: Gage Heeringa, Kevin Converse, Jonathan Llovet, Consultants, SecureITsource, Inc. Summary Our client is a leader in healthcare technology, handling billions of healthcare transactions annually. With […]
April 2, 2020
vintage-light-lamp

Why Do Identity Programs Fail?

SecureITsource Co-Founder and Principal David Mattos talks with us about some of the issues that can arise in an Identity Program and make them fail. Do […]
April 2, 2020
team-working-at-board

Building a Roadmap – SecureITsource CEO Ken Stone on the Identity Program Journey

Just starting your identity program? Already have one, but trying to figure out how to handle solutions that don’t fit your strategy anymore? Ken Stone, President […]
April 2, 2020
cyber-key

The Future of Identity – Four Trends That Will Change Your Organization’s IAM Program

Director of Identity and Access Management (IAM) Strategy Jonathan Edwards talks with us about the four major trends he sees in Identity and where organizations will […]
April 2, 2020
man-working-at-desk-at-night-with-city-backgroun

Helping You Reach Maturity in Identity Management

SecureITsource helps our clients to envision, design, and deploy successful IAM Programs. In order to better understand the IAM Journey, we have developed a Maturity Model […]
September 15, 2020
Thumbnail of SecureITsource and CyberArk webinar "Lessons Learned: How to Successfully Address Endpoint Privilege"

Lessons Learned: How to Successfully Address Endpoint Privilege – Webinar

Balancing end-point protection and productivity is a difficult task. Thanks in part to COVID-19, most organizations’ users are no longer geographically centralized and connected to the corporate network, making their workstations a primary target for malware. Endpoint security, with an emphasis on Privilege management, has been identified as a tactical necessity and put a spotlight on industry-best endpoint security solutions like CyberArk Endpoint Privilege Manager (EPM).
April 2, 2020
team-working-at-board

Building a Roadmap – SecureITsource CEO Ken Stone on the Identity Program Journey

Just starting your identity program? Already have one, but trying to figure out how to handle solutions that don’t fit your strategy anymore? Ken Stone, President […]
September 13, 2019
cloud-computing-data-security

CyberArk EPM – Culture Shifts in Security Implementation

Rahsaan Knights, Consultant, SecureITsource, Inc.   Introduction CyberArk Endpoint Privilege Manager is the authority in endpoint group policy management, with an ever-growing toolset used to empower […]
August 6, 2019
fingerprint-integrated-in-a-printed-circuit

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because […]
April 25, 2019
considering-the-big-picture

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained […]
April 9, 2019
young-businessmen-discussing-document

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity […]
March 29, 2019
it-consultant-pointing-something-out-on-screen

Gaining Control of Runaway Administrator Accounts Using the CyberArk Privileged Access Solution

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. One of the hardest types of accounts to gain control of is the privileged administrator account. Every Windows system […]
January 10, 2017

What to expect from your annual CyberArk health assessment

Christopher Meek, IAM Consultant, SecureITsource, Inc. Yearly health assessments for CyberArk deployments are invaluable, and there is no better time than the present to begin planning […]
December 19, 2016

I Got Them Keys, keys, keys

Zack Zando, IAM Consultant, SecureITsource, Inc. Have you ever wondered what DJ Khaled is talking about when he says “I got them keys, keys, keys”? No […]