Lifecycle Management

Whether an employee’s role changes, transfers, or ends, each stage in the lifecycle requires access to different tools and systems. Lifecycle Management automates the entitling and provisioning tasks needed with each step in the employee’s journey, saving IT time and increasing security in the process. These articles can tell you more.

Key Steps for Optimizing Full-Circle Identity Processes

Our last post on identity lifecycle management (LCM) covered common scenarios and actionable tips for perfecting your approach to managing identity data. This week, we’ll review some recommendations for automating employee lifecycle tasks surrounding what’s commonly referred to as “joiner, mover, leaver” (JML) processes. Many IT teams struggle…

How to Navigate Ever-Changing Identity Data

As we discussed in our first post, 4 Ways to Elevate Your Identity Game with Lifecycle Management, one of your first hurdles during an identity initiative often surrounds the management of your identity data. This challenge can be mitigated by moving towards a single source of truth for, not just your employees, but also contractors, partners, and…

4 Ways to Elevate Your Identity Game with Lifecycle Management

All types of companies struggle to keep up with the increasing pace of change in today’s business environment, especially as dynamic workforces become more prevalent. At the same time, employee, partner, and customer expectations for frictionless (but still secure) experiences are soaring. In this 5-part blog series, we’ll review the pivotal role…

What Is Provisioning and Deprovisioning?

Provisioning is the process of making information technology (IT) systems available to users. Depending on your organization’s needs, provisioning can be defined at the network, server, application, and user level: Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

The Enterprise Strikes Back: A Star Wars Story

I spent many of my childhood weekends watching Episodes IV-VI of Star Wars, the world's most famous “space opera.” Recently, it occurred to me that if the Galactic Empire had adopted a Zero Trust security model, it might have prevailed over Skywalker and the Rebels. Specifically, one could argue that the destruction of the Death Star was caused by…

How ThoughtWorks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

ThoughtWorks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, ThoughtWorks TechOps Head of Technology, says it was a long time coming. ThoughtWorks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

The Production Line: A Roundup of Productivity

In April of this year, we dreamed up The Production Line as a place to capture the Okta features that might have been flying slightly below your radar, or possibly hiding in plain sight. But it was also a place to hear from you, our users, who had things to say about each of these features, as well as the series itself. Now that the year is coming…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

Archive