In this issue, discover a cross-border access control workshop, IT security insights, M&A identity solutions, and what Hexa Policy Orchestration has to do with sourdough starter.
In this edition: Orchestration Kitchen | Livestream Replay | Events
Edition No. 7
It's February ❤️ which means your heart is probably racing with anticipation of all the exciting things happening in the world of Identity Orchestration! In this issue, we bring you an upcoming episode of the Orchestration Kitchen about cross-border access control, a new Forbes article with insights on the role app owners play in IT security, and a guide to overcoming M&A identity challenges from the Microsoft blog. Plus, an in-person IAM event to tell you about. Are you feeling the love yet? Well, watch the replay of the Enlightning Twitch show to find out how sourdough starter and kombucha may be the secret to lasting relationships as well as learn all about Policy Orchestration. Read on...
ORCHESTRATION KITCHEN
Cross-border Access Control
Multi-national companies need to provide region-specific IDPs controlled access to the apps their users need to do their jobs. How do you secure your global workforce while maintaining local control? Join the next live Orchestration Kitchen to learn how to navigate the complexities of cross-border access and ensure a secure balance between global connectivity and local compliance. February 8, 2024, at 10 am PST
Enlightning - What is Access Policy Orchestration?
OK, this was super fun! Gerry Gebel was a guest on the Enlightning Twitch Show with host Whitney Lee. She knew nothing about identity and access management, but in this episode, she lightboards live while interviewing Gerry to decode the complexities of IAM, what Hexa Policy Orchestration is all about, and why it is necessary.
The Innovate Conference in Nashville is coming up from Feb 25-28, and we hope to see you there. Want to talk about the latest threats and solutions for your IAM? Swing by our booth (#707) and join the out Nightcap event on Sunday to say hello.
Bridging the Security Gap Between App Owners and IT
Application security is at the digital heart of organizations. The responsibility of managing apps often falls to people in roles not in IT and without a security background. With apps now running on multiple clouds and using different identity providers, it's tough for app owners to cover all the bases with just one app, let alone hundreds.
This Forbes Technology Council article offers guidance on bridging the security gaps between app owners and IT and how to address the dual challenge of securing applications while ensuring compliance with legal and regulatory privacy requirements.
Solving Identity Challenges in M&A with Maverics and Microsoft
The end goal in a merger and acquisition scenario is to quickly (and cost-effectively) transition to a unified and tractable IAM posture, despite having a mix of user pools, protocols, and applications tightly coupled. Such transitions often need to happen in weeks or months, whereas a wholesale rewrite-and-migration might take years.
It's now even easier to use the service extension code editor and deploy screen. New things to look for: the ability to show compile errors as you type and diffs. We've also improved the proxy app configuration and made our Sonar OIDC test app available to run locally.
See our release notes for more information on our most exciting new features.
Large: Gartner analyst, Erik Wahlstrom, shared a link to his new report: Reduce your IAM Technical Debt. It's behind a paywall, but if you have access, it's worth the read!
Do you love The Swell? Or have ideas on how to make it even better?