May 26, 2020
Discover the Three Keys to IAM Success with Okta

Discover the Three Keys to IAM Success with Okta

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource Creating Productive and Secure Work from Home Environments By now we are all aware of the extensive effects […]
March 31, 2020
laptop-at-home

Making Work from Home Transition Easy and Free

By Ken Stone, CEO The ongoing events surrounding COVID-19 have had a more far-reaching impact than many of us could have imagined. The sudden shift to […]
June 11, 2020

Using SSO & MFA for Secure Remote Access: If not now, when?

By: Jonathan Edwards, Senior Director of Strategy, SecureITsource As organizations scrambled to get remote workforces up and running over the past several months, companies saw their […]
June 5, 2020
3 Keys to Identity and Access Management Success with Okta

3 Keys to Identity and Access Management Success with Okta – Webinar

Hear what our Okta experts have to say about how to use Okta in a successful Identity and Access Management program. Current best practices Lessons learned […]
April 20, 2020
considering-the-big-picture

Case Study: Operational Excellence Meets Sarbanes-Oxley

By: Gage Heeringa, Kevin Converse, Jonathan Llovet, Consultants, SecureITsource, Inc. Summary Our client is a leader in healthcare technology, handling billions of healthcare transactions annually. With […]
April 2, 2020
vintage-light-lamp

Why Do Identity Programs Fail?

SecureITsource Co-Founder and Principal David Mattos talks with us about some of the issues that can arise in an Identity Program and make them fail. Do […]
April 2, 2020
team-working-at-board

Building a Roadmap – SecureITsource CEO Ken Stone on the Identity Program Journey

Just starting your identity program? Already have one, but trying to figure out how to handle solutions that don’t fit your strategy anymore? Ken Stone, President […]
April 2, 2020
cyber-key

The Future of Identity – Four Trends That Will Change Your Organization’s IAM Program

Director of Identity and Access Management (IAM) Strategy Jonathan Edwards talks with us about the four major trends he sees in Identity and where organizations will […]
April 2, 2020
man-working-at-desk-at-night-with-city-backgroun

Helping You Reach Maturity in Identity Management

SecureITsource helps our clients to envision, design, and deploy successful IAM Programs. In order to better understand the IAM Journey, we have developed a Maturity Model […]
April 2, 2020
meeting-writing-at-flipchart

Using Okta to Unify and Simplify Your Identity Program

Identity programs have become more and more complex over time, preventing organizations from managing their users and systems in simple, consistent ways. At SecureITsource, we partner […]
September 13, 2019
cloud-computing-data-security

CyberArk EPM – Culture Shifts in Security Implementation

Rahsaan Knights, Consultant, SecureITsource, Inc.   Introduction CyberArk Endpoint Privilege Manager is the authority in endpoint group policy management, with an ever-growing toolset used to empower […]
August 6, 2019
fingerprint-integrated-in-a-printed-circuit

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because […]
March 31, 2020
laptop-at-home

Making Work from Home Transition Easy and Free

By Ken Stone, CEO The ongoing events surrounding COVID-19 have had a more far-reaching impact than many of us could have imagined. The sudden shift to […]
February 21, 2019

Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   […]
December 20, 2018

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model […]
November 19, 2018

You’re More Susceptible to Social Engineering Than You Think

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. In today’s world of technology, Social Engineering is a common topic. Many articles and websites are devoted to the […]
November 13, 2018

Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of […]
October 30, 2018

Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how SecureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s […]
September 22, 2018

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, […]
September 6, 2018

SecureITsource Named “Innovative Solution Partner” by CyberArk

Press release – SecureITsource Named “Innovative Solution Partner” by CyberArk  
July 27, 2018

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a […]