Blog

IDaaS: Does one size fit all?

Today, the biggest consideration for determining whether Identity as a Service (IDaaS) is right for your organization is accepting 'one size fits all’; vendors offering multi-tenant IDaaS solutions must provide general workflow and configuration which ...
Read More

Program driven cybersecurity initiatives

Focus on the long-term value to your organization when planning a cybersecurity initiative Although Privileged Access Management (PAM) products can be easy to deploy quickly, a recent project with a multinational firm demonstrates the value ...
Read More

Aligning executive order with IAM

The President’s Executive Order Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, signed on May 11th, 2017 unveils a new era in American cybersecurity education and training. If your organization is to stay ahead ...
Read More

Certification automation benefits

Certifications / Attestation campaigns are critical to all identity governance programs.  Our infographic shows the benefits of using SailPoint Identity IQ to automate end to end certification processes for healthcare clients using electronic medical record ...
Read More

Security Road Maps: Moving Your Business Beyond the Present

Business success can often feel like a process of trial and error. Integral Partners' advisory services engagement is a customized set of pragmatic recommendations that guide your company towards a comprehensive and executable strategy in identity ...
Read More

CyberArk solution accelerates NERC-CIP compliance

Integral Partners recently worked with a utility company in the eastern United States on a project to demonstrate NERC-CIP compliance using CyberArk's privileged access management solution. The primary goals of the project were to ensure accountability for every use of ...
Read More

Identity and Access Management; It’s a program – not a project

When considering an Identity and Access Management (IAM) project to address Privileged Account Management (PAM), most companies are fearful to look beyond their IT stakeholders.  For ongoing success, it’s important for PAM project sponsors to ...
Read More

Lessons about Cloud Security from 1980s Horror Movies

Recently, Kayne McGladrey, Integral Partners Information Security Director, published an article in the March 2017 ISSA Journal that discusses how businesses can apply three fundamental best practices for adapting current security programs to mitigate insider threats as ...
Read More

@Pebble is Shutting Down. Can They Take Two-Factor Authentication for #Cybersecurity With Them?

Earlier this week, Pebble announced that they would cease operations as a company and become part of FitBit. I was running through the Salt Lake City airport two days after I received my first Kickstarter ...
Read More

Threat Of Insider Attacks

Insider attacks are on the rise since 2016, but companies struggle with monitoring access to secured resources and implementing a least-privileged access model, which is essential to stop breaches. Businesses can use the Centrify Enterprise ...
Read More

Ready to talk IT Security with us?

Contact Us