Blog

Aligning executive order with IAM

The President’s Executive Order Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, signed on May 11th, 2017 unveils a new era in American cybersecurity education and training. If your organization is to stay ahead ...
Read More

Certification automation benefits

Certifications / Attestation campaigns are critical to all identity governance programs.  Our infographic shows the benefits of using SailPoint Identity IQ to automate end to end certification processes for healthcare clients using electronic medical record ...
Read More

Security Road Maps: Moving Your Business Beyond the Present

Business success can often feel like a process of trial and error. Integral Partners' advisory services engagement is a customized set of pragmatic recommendations that guide your company towards a comprehensive and executable strategy in identity ...
Read More

CyberArk solution accelerates NERC-CIP compliance

Integral Partners recently worked with a utility company in the eastern United States on a project to demonstrate NERC-CIP compliance using CyberArk's privileged access management solution. The primary goals of the project were to ensure accountability for every use of ...
Read More

Identity and Access Management; It’s a program – not a project

When considering an Identity and Access Management (IAM) project to address Privileged Account Management (PAM), most companies are fearful to look beyond their IT stakeholders.  For ongoing success, it’s important for PAM project sponsors to ...
Read More

Lessons about Cloud Security from 1980s Horror Movies

Recently, Kayne McGladrey, Integral Partners Information Security Director, published an article in the March 2017 ISSA Journal that discusses how businesses can apply three fundamental best practices for adapting current security programs to mitigate insider threats as ...
Read More

@Pebble is Shutting Down. Can They Take Two-Factor Authentication for #Cybersecurity With Them?

Earlier this week, Pebble announced that they would cease operations as a company and become part of FitBit. I was running through the Salt Lake City airport two days after I received my first Kickstarter ...
Read More

Threat Of Insider Attacks

Insider attacks are on the rise since 2016, but companies struggle with monitoring access to secured resources and implementing a least-privileged access model, which is essential to stop breaches. Businesses can use the Centrify Enterprise ...
Read More

The Truth-Bias and How It Affects IAM, IGA and PAM Programs

In his research on deception, Jeff Hancock often refers to the Truth-Bias, formally recognized by Levine, McCornack, and Park in 1999. In essence, people have a higher tendency to believe other people, particularly via email ...
Read More

IAM market consolidation looms in 2017

I predict that 2017 will be a year of market consolidation in the Identity and Access Management (IAM) market, driven by organizational changes rather than revolutionary improvements in technology. Consequently, niche vendors will resort to ...
Read More

Ready to talk IT Security with us?

Contact Us