The Advantage of SailPoint’s SaaS IGA with Bundled Services
October 12, 2020
A New Path to Flexible, Economical Identity Governance While the need for rigorous Identity Governance and Administration (IGA) capabilities is well understood, organizations frequently struggle to implement and support an effective IGA solution. The concerns include the lack of needed skills within the organization as well as the often unpredictable read more »
2021 IAM Budgeting: 9 Tips to Help Ensure You’re Secure
October 6, 2020
As discussed in our recent blog post, “4 Weakness COVID has Exposed in Your IAM Program (and how to fix them), 2020 has forced many companies to reevaluate their identity and access management support. The weaknesses COVID has brought to light, and the resulting stress it’s caused, has motivated many read more »
4 Weaknesses COVID has Exposed in Your IAM Program (and how to fix them)
September 26, 2020
COVID’s impact on businesses has included special challenges for identity and access management (IAM) programs. First and most obvious is the unprecedented demand of a remote workforce. The second challenge is the unfortunate need to reduce the workforce through layoffs and furloughs. Third is the need to do just the read more »
Have You Revisited Your IAM Roadmap and Strategy Lately?
August 24, 2020
Imagine you’re going on a roadtrip: chances are you’ll be using some kind of map or GPS to get there. Even when you know your destination — but especially if you’re going somewhere you’ve never been before — you’ll want to rely on directional data to get you where you read more »
A Recipe for PAM Success
June 23, 2020
2020 has been an unusual year, one that has tested traditional best practices, demanded unprecedented agility and highlighted gaps in legacy systems. Record numbers of organizations now have people working remotely, many for the first time, raising security concerns they hadn’t previously considered. The new normal for remote access has read more »
What to Consider with a Legacy IGA Replacement
May 19, 2020
Let’s say you want to replace your legacy identity governance and administration (IGA) system and bring your organization into the modern era. You might find yourself asking the following questions: What are the prerequisites for replacing our legacy system? Do we need a migration strategy? What’s the business case for read more »
Short-term crisis response as long-term strategy
April 1, 2020
These past few weeks have been chaotic for everyone both personally and professionally as the world responds to the threat of the coronavirus (COVID-19). While individuals have focused on protecting themselves and their families, organizations have scrambled to manage an increasingly dispersed workforce and deliver on company objectives in the read more »
The Most Important (and Overlooked) Part of IAM
March 16, 2020
Here’s a situation we see often: an organization recognizes that it needs to improve its identity and access management (IAM) approach, and wants to invest in a technology solution, but it has minimal IAM policies in place. Maybe it has an understanding around creating complex passwords and how frequently they read more »
Is IDaaS Ready for Your Business
February 18, 2020
With so much technology nowadays delivered via the web, it’s no surprise that an increasing amount of data, applications, and transactions are moving to the cloud—including traditional identity and governance administration (IGA) and access management and enforcement (AME) functionality. IDaaS, or identity as a service, provides cloud-based authentication and provisioning, read more »
Gartner 2019 IAM Summit Wrap-up
January 10, 2020
2019 was Integral Partners sixth year attending the annual Gartner Identity and Access Management Summit in Las Vegas, and as always it was interesting to compare Gartner’s perspective on identity with what we see “in the wild” while working directly with clients and vendors. Gartner IAM is THE place to read more »
The Business Case for Upgrading Your IAM
September 24, 2019
Is it fall budget planning season at your company? Many organizations are thinking now about their 2020 spend, and what percent of their budgets they’ll allocate to security and Identity and Access Management (IAM). If that sounds like you, here are some surprising statistics to keep in mind: Though IAM read more »
Privacy and IAM: What You Need to Know
August 21, 2019
From credit agency breaches and stolen credit cards to GDPR and social media data, privacy has been very much in the news lately—and it’s an issue undoubtedly on every CEO’s mind. A Gartner survey ¹ found that concerns about “rapidly accelerating privacy regulations” have become the top emerging risk for executives. Although read more »
Identifying and Managing Risk in IGA Deployments
August 13, 2019
Deploying an IGA (Identity Governance and Administration) solution is typically a fundamental part of a company’s Identity and Access Management (IAM) program. For organizations that need to apply controls to role-based access, automate approvals and certifications, streamline processes, and mitigate risk, an IGA system can be an essential tool for read more »
IGA Project Prerequisites
July 23, 2019
Fundamentals Before You Start Identity Governance and Administration (IGA) helps organizations connect critical business systems to controls and processes that will protect them. A successful IGA project facilitates and automates good decision making about identity and access to sensitive data. Many organizations use software to help them manage identity lifecycles, read more »
The What, Why, and How of IAM Governance
June 4, 2019
Most professionals are familiar with the three principles guiding effective business systems: people, process, and technology. But as technology becomes cheaper, easier to use, and more available, the “people and process” principles are often overlooked. This is unfortunate, because people and process are the key to governance: the establishment of read more »
Roadmaps to Reality – Transition IAM Recommendations to Results
April 29, 2019
How do Companies Define Value in IAM? As with nearly any realm of technology, there’s often a disconnect inside companies between the people who would operate an identity access management (IAM) solution and the people who would fund it. Within the executive suite, for example, it’s common for a CISO read more »
The Right Way to Create an IAM Strategy and Roadmap
April 2, 2019
Recently we shared some reasons why every company needs an identity and access management (IAM) roadmap, and what motivates companies to seek help in developing their IAM plans. But what does this process entail, what are the results, and what’s distinctive about the way we do it? When companies decide read more »
Why Every Company Needs an IAM Roadmap
March 5, 2019
What Motivates Companies to Invest in IAM Why do companies choose to invest in Identity and Access Management (IAM)? Just as people typically visit a doctor only when they’re sick or hurt, most companies initially seek to invest in IAM because they have a problem to solve. They’re worried about read more »
SailPoint recognizes Integral Partners as a top delivery partner in 2018
February 6, 2019
Recently SailPoint recognized Integral Partners as a top 2018 delivery partner by designating the firm as a Delivery Admiral. With over 260 global integration partners, SailPoint recognized just 16 firms for this prestigious certification. SailPoint’s recent press release described the program as follows: “For partners with a proven ability to deliver rapid ROI read more »
Gartner 2018 Identity Summit: Key Takeaways
December 19, 2018
Gartner 2018 Identity Summit – New Year, New Acronyms, Same Message Following the final presentation at this year’s Gartner Identity Summit, over 2,000 identity professionals departed Las Vegas and contemplated three and a half days of analyst insights, vendor hype, practitioner perspective and peer lessons. Based on shared information, the read more »
Data Access Governance (DAG) Insights
November 26, 2018
The primary objective of an effective IAM road map is to deliver business value with well-defined and properly prioritized recommendations which are accurately budgeted, architecturally sound, and systematically delivered. Business value is realized by reducing risk through proper enforcement of policies and utilization of technology which addresses security & compliance read more »
The Zero Trust Promise
October 23, 2018
Every year it seems like there is yet another Top 10 list of cybersecurity trends. Over the past several years, however, many of these trends have had staying power to become critical elements of modern IT reality: Internet of things Cloud services Methods of attack: Ransomware, third party, phishing (Party read more »
Foundations of Identity Success – Eight Strategy and Roadmap Elements
August 20, 2018
Since 2013, Integral Partners has helped organizations maximize internal resources, enforce policy, simplify compliance, secure funding, deploy technology and execute strategies for effective investment in identity governance and administration (IGA), access enforcement and privileged account management (PAM). Integral Partners experience reinforces the undeniable truth: companies which invest and execute an read more »
Budget considerations for your 2019 cyber security program
July 16, 2018
We’re over halfway through 2018 and cyber criminals are continuing to profit at the expense of breached organizations. Protecting and managing privileged and application credentials while proactively identifying breaches before threat actors move laterally remain key challenges faced by the modern security operations center. Integral Partners has contributed an editorial read more »
Identity Management and Anthropology
June 19, 2018
At first glance, it may seem that identity management have nothing to do with anthropology. But look closer and internal IAM programs for employees mirror the rules and activities of a tight-knit clan. Employees of an organization, and clan members both share a set of values, common mission, and close read more »
Using Robotic Process Automation to accelerate IGA deployments
April 10, 2018
A technique gaining momentum in Identity Governance and Administration (IGA) practices involves the use of Robotic Process Automation (RPA) tools to speed up application integration. Large companies spend millions of dollars each year integrating target applications after foundational work is done. Integrating applications, network devices, infrastructure, and databases is necessary read more »
ISSA Article of the Year
March 21, 2018
Recently, Kayne McGladrey, Integral Partners’ Information Security Director, was recognized by ISSA for article of the year. The article originally appeared in the March 2017 ISSA Journal and discussed how businesses can apply three fundamental best practices for adapting current security programs to mitigate insider threats as applications and data migrate to read more »
Back-of-the-cocktail-napkin math
February 15, 2018
Our team recently attended Gartner’s Identity and Access Management conference in Las Vegas, Nevada, and we had the pleasure of meeting many first-time attendees who had not yet deployed a Privileged Access Management (PAM) program. This might come as a surprise, as there was a landslide of panic-driven purchasing in read more »
Four Critical Cybersecurity Predictions for 2018
January 9, 2018
Our team recently attended the Gartner Identity and Access Management conference in Las Vegas, Nevada to help shape the future of cybersecurity for 2018. Over 1,600 attendees came to learn about what’s next for cybersecurity. Our experts developed four predictions for next year based on exclusive conversations with attendees and read more »
2018 Prediction: The IDaaS market matures without a clear leader
January 9, 2018
The market is ready for an Identity-as-a-service leader – but you wouldn’t know it from the conference topics. This year’s Gartner IAM Summit has the usual mix of beginner introduction sessions and advanced forward-looking material (Blockchain!). What wasn’t covered to a great degree is Identity-as-a-service (IDaaS). Sure, there were read more »
IGA Adoption Practices and Challenges: Part 4 – Tool Configuration
December 11, 2017
Moving beyond organizational alignment and operational support, optimizing an IGA solution requires technical collaboration and coordination. Configuring the tool properly relies heavily upon proper stakeholder management, full requirements-gathering, and testing prior to going live. Missing steps in any of these phases can mean a poorly deployed tool that does not read more »
IGA Adoption Practices and Challenges: Part 3 – Operational Support
December 10, 2017
Once deployed, IGA platforms require ongoing “care and feeding” to stay current and operational. This is another challenge often underestimated in IGA planning. Here are specifics for generating ongoing value out of an IGA investment. Upkeep of integrated systems in IGA IGA tools take in data feeds from many systems read more »
IGA Adoption Practices and Challenges: Part 2 – Sponsorship and Adoption
December 9, 2017
Failure to secure the proper involvement of executive sponsors and user adoption in every area impacted by IGA are chief reasons implementation projects struggle. IGA touches every aspect of an organization and continues to affect operations as internal users join, move, or leave the organization while increasing numbers of external read more »
IGA Adoption Practices and Challenges: Part 1 – Introduction
December 8, 2017
Integral Partners is a specialized consulting firm with extensive experience in deploying Identity Governance and Administration (IGA) solutions in large and small environments across many sectors. We have created a four-part series to discuss three critical engagement areas many organizations struggle with when deploying IGA solutions. Our experience, obtained through read more »
Budget Planning for 2018 – Are you ready for artificial intelligence and machine learning IAM solutions?
September 27, 2017
This summer, Integral Partners participated in several national cybersecurity, identity and access management and privilege management conferences and webinars. A recurring theme was the growing role of artificial intelligence (AI) and machine learning (ML) and how these technologies will support security efforts in the modern enterprise. Our team found the read more »
IDaaS: Does one size fit all?
August 17, 2017
Today, the biggest consideration for determining whether Identity as a Service (IDaaS) is right for your organization is accepting ‘one size fits all’; vendors offering multi-tenant IDaaS solutions must provide general workflow and configuration which fit all customers, regardless of unique use cases or governance demands. Vendor roadmaps (and commitment read more »
Program driven cybersecurity initiatives
July 28, 2017
Focus on the long-term value to your organization when planning a cybersecurity initiative Although Privileged Access Management (PAM) products can be easy to deploy quickly, a recent project with a multinational firm demonstrates the value of organizing a privileged access management program rather than a myopic focus on rapid read more »
Aligning executive order with IAM
June 15, 2017
The President’s Executive Order Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, signed on May 11th, 2017 unveils a new era in American cybersecurity education and training. If your organization is to stay ahead of global cyber threats, then implementing the direct changes outlined in the executive order are read more »
Certification automation benefits
May 24, 2017
Certifications / Attestation campaigns are critical to all identity governance programs. Our infographic shows the benefits of using SailPoint Identity IQ to automate end to end certification processes for healthcare clients using electronic medical record leader, Epic. These benefits extend to any application that’s part of an organizations governance requirements.
Security Road Maps: Moving Your Business Beyond the Present
May 16, 2017
Business success can often feel like a process of trial and error. Integral Partners’ advisory services engagement is a customized set of pragmatic recommendations that guide your company towards a comprehensive and executable strategy in identity and access management. Rome was not built in a day—and neither is a read more »
CyberArk solution accelerates NERC-CIP compliance
April 18, 2017
Integral Partners recently worked with a utility company in the eastern United States on a project to demonstrate NERC-CIP compliance using CyberArk’s privileged access management solution. The primary goals of the project were to ensure accountability for every use of a privileged account and to record every privileged session for auditing. NERC-CIP requires a high read more »
Identity and Access Management; It’s a program – not a project
March 14, 2017
When considering an Identity and Access Management (IAM) project to address Privileged Account Management (PAM), most companies are fearful to look beyond their IT stakeholders. For ongoing success, it’s important for PAM project sponsors to engage from the outset with business stakeholders who, as owners of their corporate data, must read more »
Lessons about Cloud Security from 1980s Horror Movies
March 8, 2017
Recently, Kayne McGladrey, Integral Partners Information Security Director, published an article in the March 2017 ISSA Journal that discusses how businesses can apply three fundamental best practices for adapting current security programs to mitigate insider threats as applications and data migrate to the cloud. We recommend that businesses work to establish a read more »
@Pebble is Shutting Down. Can They Take Two-Factor Authentication for #Cybersecurity With Them?
March 7, 2017
Earlier this week, Pebble announced that they would cease operations as a company and become part of FitBit. I was running through the Salt Lake City airport two days after I received my first Kickstarter Pebble when my wrist buzzed. The message on the tiny black e-ink screen said there read more »
Threat Of Insider Attacks
February 19, 2017
Insider attacks are on the rise since 2016, but companies struggle with monitoring access to secured resources and implementing a least-privileged access model, which is essential to stop breaches. Businesses can use the Centrify Enterprise Suite to deploy session auditing and least privileges in under ninety days so that employees read more »
The Truth-Bias and How It Affects IAM, IGA and PAM Programs
February 11, 2017
In his research on deception, Jeff Hancock often refers to the Truth-Bias, formally recognized by Levine, McCornack, and Park in 1999. In essence, people have a higher tendency to believe other people, particularly via email as there is a permanent record of the conversation. Unfortunately, people are only able to read more »
IAM market consolidation looms in 2017
January 4, 2017
I predict that 2017 will be a year of market consolidation in the Identity and Access Management (IAM) market, driven by organizational changes rather than revolutionary improvements in technology. Consequently, niche vendors will resort to increasingly desperate discounting schedules, funding rounds, or mergers to stay solvent as the year progresses. read more »
Launch your own privileged insider attacks for under $1,500 USD
December 19, 2016
Recent computer security news coverage has focused on nation-states and advanced persistent threats (APTs) conducting cyber-espionage around the globe. What if you are a lone wolf looking to make a name for yourself by breaching a prominent company, but you are not bankrolled by a country with less-than-stringent laws about read more »
Getting Started with Identity Analytics for an Identity and Access Management (IAM) Program
November 30, 2016
User and device analytics have been a primary focus of this year’s Gartner Identity and Access Management (IAM) Summit. Keynote speakers, research analysts, and vendors have all shown a vision of how companies can help to improve an organization’s security posture through deploying User and Entity Behavior Analytics (UEBA). Unfortunately, read more »