Automating CyberArk Administration Tasks

Michael Campbell, Senior Consultant, SecureITsource, Inc. Automation is quickly taking over the network and infrastructure pieces of enterprise environments. Software is deployed at the click of a button and applications are communicating and working with other applications, not people. While … Continued

Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how secureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s Application Identity Manager (AIM). The goals of RPA in the enterprise are to streamline operations, … Continued

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, it can be found here. If you are new to this series, click here to start from Part … Continued

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a service” offerings that companies around the globe are taking advantage of to run their … Continued

How Privilege Management Improves Identity Governance

Mike Campbell, Senior Consultant, SecureITsource, Inc. Identity and Access Management (IAM) covers a considerable portion of the information security domain, from providing employees and customers access to systems and applications, to managing the lifecycle of the accounts those users use … Continued