Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained details of the implementation and overlooking the “big picture.” This applies to the design of … Continued

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity and of those many are in IAM / PAM in some fashion. All this … Continued

Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   Problem   The customer had both Sailpoint IdentityIQ (IIQ) and CyberArk implemented into their … Continued

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model access to resources at the organization. Kicking off their annual IAM Summit this month, … Continued

Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of a button and applications are communicating and working with other applications, not people. While … Continued