CyberArk EPM – Culture Shifts in Security Implementation

Rahsaan Knights, Consultant, SecureITsource, Inc.   Introduction CyberArk Endpoint Privilege Manager is the authority in endpoint group policy management, with an ever-growing toolset used to empower end-users and strengthen security simultaneously. EPM is robust enough to manage any organization size, … Continued

Eliminating Passwords in the Enterprise

Mike Campbell, Senior Consultant, SecureITsource, Inc. Passwords. We all have them. A username that identifies who you are, and a corresponding password to prove it, because only you should know the password, right? To date, passwords are still the most … Continued

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained details of the implementation and overlooking the “big picture.” This applies to the design of … Continued

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity and of those many are in IAM / PAM in some fashion. All this … Continued

Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   Problem   The customer had both Sailpoint IdentityIQ (IIQ) and CyberArk implemented into their … Continued

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model access to resources at the organization. Kicking off their annual IAM Summit this month, … Continued