In this edition: Orchestration Kitchen | Women in Identity | New Articles
Edition No. 8
It may almost be spring, but we're not taking a break. There's much to talk about in this March edition of The Swell, including how to be resilient when your IDP goes down (hint: there's an Orchestration Recipe for that), what Gartner recommends for breaking free of the tech debt dragging you down, and as a celebration of International Women's Day, we've got words of wisdom from one of the rad, bada$$ women from Strata Identity to inspire you. Buckle up and read on!
ORCHESTRATION KITCHEN
Resilience for your apps — no matter what happens to your IDP
What happens if your IDP goes down? Do you have a plan that lets your team get into essential apps while access is restored? Because without built-in resiliency, things can get chaotic. Fast. If you don’t have a backup — or if you want one for your current backup — watch this workshop. We’ll show you how to turn any active cloud or on-prem IDP into your emergency backup.
Gartner’s 2024 Reduce IAM Technical Debt report is out, and Strata was named a representative vendor. As stated in the research: “Technical debt weakens the agility of an IAM team and the effectiveness of organizational security controls. Security and risk management technical professionals must tackle siloed tools, legacy integrations, incomplete discovery, poor IAM hygiene, and difficult onboarding processes to resolve it (IAM Technical Debt).” Access available with a Gartner subscription.
Every employee, no matter where they are, needs access to common applications. Learn how to support your multinational operations with region-specific IDPs. Your users get controlled access to common apps, and your international customer data stays compliant! We'll also show you how to store employee data within a specific hiring region, apply nuanced region or IDP-based access policies, and enforce country-level controls regardless of users' login locations. Check out this brand-new Orchestration Cookbook to help your organization navigate the complexities of cross-border access and ensure a harmonious balance between global connectivity and local compliance.
Beyond authentication: Understanding broader risks in IAM
While authentication is crucial, it is not enough to fully secure data. This Forbes article discusses the importance of the “access” part in identity and access management (IAM) systems. Access management defines and enforces conditions for users and services to utilize protected resources and data. However, user journeys differ, and various rules and policies change based on roles, applications, and context. IAM frameworks have many moving parts, and a best practice approach involves staying neutral, flexible, and tuned to industry developments.
In honor of International Women's Day this week, we are shining a light on our amazing Customer Support & Success Manager, Jen Quinn.
What do you enjoy about working in Identity Management?
I work with the best people and customers and I learn from all of them. Every day is a bit different and I enjoy the challenges that come with that. I love figuring out the puzzle and then nothing beats the satisfaction of resolving a complicated issue.
Is there something you wish you'd known when you began your career?
Ask all of the questions and share your own knowledge. Don’t be afraid to be wrong; that’s how we learn. Sometimes it’s not easy to be heard over the other voices, so speak up and hold your ground when necessary.
You can now upload and deploy binary file types as assets with your service extensions. See our release notes for more information on our most exciting new features.
Small:Happy International Women's Day!Women in Identity (WID) supports people who identify as women in the identity community. Learn more about what drives these inspiring leaders and how you can join.
Medium:Watch the Identiverse webinar featuring a panel of Identity industry pioneers discussing why authorization has hit a critical point and why you need to pay attention.
Large: The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. Check it out.
Do you love The Swell? Or have ideas on how to make it even better?