In the digital age, the security of customer data is paramount. With the rise of online transactions, businesses are increasingly dealing with sensitive customer data, making it a prime target for cybercriminals. This is where Customer Identity Access Management (CIAM) comes into play. What is CIAM? CIAM, or Customer Identity Access Management, is a solution […]
IDMWORKS breaks down the recent high-stakes casino digital heist: navigating the MGM cyber attack – a pathway to enhanced cyber resilience. The ALPHV/BlackCat group ransomware attack on MGM Resorts targeted the computer systems of the casino-hotel chain, causing extensive disruption to both their digital and physical operations. The breach, initiated via LinkedIn, affected various aspects […]
Tips on efficiently paginating SailPoint NERM (previously known as SecZetta) API results. SailPoint’s Acquisition of SecZetta In early 2023, SailPoint made headlines by acquiring SecZetta, a leading provider of non-employee management software. IDMWORKS had both SailPoint and SecZetta practices and the combination of SecZett and IdentityNow provided a much needed interface to manage contractors and […]
Gain high-level findings and recommendations to enhance your CIAM strategy. CIAM (Customer Identity & Access Management) has emerged as a pivotal trend in the IAM marketplace – and with good reason. From global giants like Amazon and Apple to local small businesses, a robust online presence and direct engagement with consumers have become the norm. […]
ServiceNow has become an industry leading ITSM technology seen in a large number of IDMWORKS clients. Integration with an ITSM system to both managed accounts and leverage the ticketing functions has become a standard part of most IGA deployments. ServiceNow Service Desk integration enables organizations to create service requests, incidents, and change requests in ServiceNow […]
Password resets in mainframe systems can often become a significant burden on help desks. IDMWORKS’ proprietary IdentityForge Mainframe connectors offer a seamless and efficient solution to this issue. Let’s delve into the challenges and the solution we provide. The Challenge with Mainframe Password Resets IAM vendors are constantly changing the list of connectors available to […]
Introduction If you are a .NET shop, it is likely that, at some point, your codebase and team will grow to a size where it becomes beneficial to publish and consume custom NuGet packages. Additionally, in many cases, it is likely you need to host these NuGet packages in a private artifact repository. In this […]
Introduction Bitbucket Pipelines is an excellent CI/CD tool that allows users of Bitbucket to automate the Continuous Integration and Continuous Delivery of their software, including: Building code Running automated tests Auditing code for vulnerabilities Performing static code analysis Packaging code artifacts Publishing code Deploying code Challenge One of the challenges developers may face after adopting […]
The healthcare industry handles some of the most sensitive data and passwords, including patients’ personal health information. As a result, healthcare organizations are highly regulated and must implement strict security controls to protect customers’ privacy. Despite these measures, healthcare data breaches frequently make news headlines, often resulting in reporting to regulatory bodies and the customers […]
Oracle Identity Governance (OIG) 12c uses connectors to reconcile user data from trusted source applications like Oracle Identity Cloud Service (IDCS). By default, OIG will perform a full reconciliation and sync all users from the source application. What is Incremental Reconciliation? The incremental reconciliation is a concept in IDM demography were during the reconciliation of […]