Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how secureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s Application Identity Manager (AIM). The goals of RPA in the enterprise are to streamline operations, … Continued

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, it can be found here. If you are new to this series, click here to start from Part … Continued

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a service” offerings that companies around the globe are taking advantage of to run their … Continued

How Privilege Management Improves Identity Governance

Mike Campbell, Senior Consultant, SecureITsource, Inc. Identity and Access Management (IAM) covers a considerable portion of the information security domain, from providing employees and customers access to systems and applications, to managing the lifecycle of the accounts those users use … Continued

VPNFilter Malware – All You Need To Know

Josh Raduka, Senior Consultant, SecureITsource, Inc. Nearly a month ago today, malware with ties to the Russian government, known as VPNFilter, was released into the “wild”. Suspected to be state sponsored or affiliated, this malware infected what was originally thought … Continued

CyberArk Project Maturity: How does your implementation compare?

Christopher Underwood, Senior IAM Consultant, SecureITsource, Inc. Providing professional services gives consultants the opportunity to recognize the maturity of an organization’s service offerings. During my time as a Cyberark customer, I was unaware of where our deployment might fall in comparison … Continued