June 6, 2019

Your Identity Delivery Partner’s Culture Is Important to You – Here’s Why

Jonathan Edwards, Director of IAM Strategy, SecureITsource, Inc. You have spent months researching, conducting assessments, identifying requirements, watching demos or performing Proof of Concepts (PoC), and […]
April 25, 2019

Considering the big picture with access management solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. The implementation of any system meant to address a complex issue may succumb to a common pitfall: focusing on fine-grained […]
April 9, 2019

Another one bites the dust

Gary Jolley, IAM Consultant, SecureITsource, Inc. Many of my friends and contacts are in Information Technology in some shape or form and most are in Cybersecurity […]
March 29, 2019

Gaining Control of Runaway Administrator Accounts Using the CyberArk Privileged Access Solution

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. One of the hardest types of accounts to gain control of is the privileged administrator account. Every Windows system […]
February 21, 2019

Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   […]
December 20, 2018

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model […]
November 19, 2018

You’re More Susceptible to Social Engineering Than You Think

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. In today’s world of technology, Social Engineering is a common topic. Many articles and websites are devoted to the […]
November 13, 2018

Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of […]
October 30, 2018

Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how SecureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s […]
September 22, 2018

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, […]
September 6, 2018

SecureITsource Named “Innovative Solution Partner” by CyberArk

Press release – SecureITsource Named “Innovative Solution Partner” by CyberArk  
July 27, 2018

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a […]