Lifecycle Management

Whether an employee’s role changes, transfers, or ends, each stage in the lifecycle requires access to different tools and systems. Lifecycle Management automates the entitling and provisioning tasks needed with each step in the employee’s journey, saving IT time and increasing security in the process. These articles can tell you more.

Okta for Global 2000: Agile Identity for the world's largest public companies

For the companies on the Forbes Global 2000 list, change is more than just a given. It’s an imperative.  For these massive global organizations, high-stakes moments like mergers and acquisitions, divestitures, expansions, and restructuring all drive growth and innovation. They also present sizable challenges that leave executives asking, “How can…

What you Need to Know: An Update on the GLBA Safeguards Rule

With the expanding scope of cyberattacks on financial institutions and a substantial increase in fraud, government and industry oversight bodies are stepping up with new regulations and requirements to protect consumers. One of the most recent examples are the updates to the Gramm-Leach Bliley Act (GLBA).  After 20 years of regulating information…

10 Tips for Breaking Down the Complexities of Audits & Compliance

In our previous posts for this 5-part series on lifecycle management, we offered various best practices you could implement to better manage identity data, lifecycle processes, and access grants. Today, we’ll review the identity-related challenges surrounding audits and compliance, and offer ten ways to gradually chip away at the complexities of…

Best Practices for Perfecting Dynamic (Yet Secure) Access Grants

Last week, we shared some advice for better managing identity lifecycle processes with some key steps for optimizing full-circle identity processes. In this post, we’ll dig into common challenges surrounding access grants. No matter how mature your access management practices are, IT and security teams are constantly confronted with questions like…

Key Steps for Optimizing Full-Circle Identity Processes

Our last post on identity lifecycle management (LCM) covered common scenarios and actionable tips for perfecting your approach to managing identity data. This week, we’ll review some recommendations for automating employee lifecycle tasks surrounding what’s commonly referred to as “joiner, mover, leaver” (JML) processes. Many IT teams struggle…

How to Navigate Ever-Changing Identity Data

As we discussed in our first post, 4 Ways to Elevate Your Identity Game with Lifecycle Management, one of your first hurdles during an identity initiative often surrounds the management of your identity data. This challenge can be mitigated by moving towards a single source of truth for, not just your employees, but also contractors, partners, and…

4 Ways to Elevate Your Identity Game with Lifecycle Management

All types of companies struggle to keep up with the increasing pace of change in today’s business environment, especially as dynamic workforces become more prevalent. At the same time, employee, partner, and customer expectations for frictionless (but still secure) experiences are soaring. In this 5-part blog series, we’ll review the pivotal role…

What Is Provisioning and Deprovisioning?

Provisioning is the process of making information technology (IT) systems available to users. Depending on your organization’s needs, provisioning can be defined at the network, server, application, and user level: Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

Archive