Case Study – SailPointIIQ & CyberArk for Financial Services

Company Overview   An American Financial Services Firm. FSOC designated Systemically Important Financial Market Utility. Over $100 Billion in margin holdings Employee Size: ~1000 Employees   Problem   The customer had both Sailpoint IdentityIQ (IIQ) and CyberArk implemented into their … Continued

Reining in Roles with Access Management Solutions

Gage Heeringa, IAM Consultant, SecureITsource, Inc. A fundamental business problem that is addressed by an organization’s Identity and Access Management (IAM) implementation is how to model access to resources at the organization. Kicking off their annual IAM Summit this month, … Continued

Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of a button and applications are communicating and working with other applications, not people. While … Continued

Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how secureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s Application Identity Manager (AIM). The goals of RPA in the enterprise are to streamline operations, … Continued

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, it can be found here. If you are new to this series, click here to start from Part … Continued

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a service” offerings that companies around the globe are taking advantage of to run their … Continued