Lifecycle Management

Whether an employee’s role changes, transfers, or ends, each stage in the lifecycle requires access to different tools and systems. Lifecycle Management automates the entitling and provisioning tasks needed with each step in the employee’s journey, saving IT time and increasing security in the process. These articles can tell you more.

How Thoughtworks solves the big (and small) problems with Okta Workflows

Thoughtworks is a global software consultancy firm with a reputation for tackling tough projects. As Steve Quirke, Identity team lead, explains: “We’re here to build the products that differentiate our customers from the competition. Clients hire us for our ability to digitally transform global enterprises at scale by applying strategic consulting…

Okta for Global 2000: Agile Identity for the world's largest public companies

For the companies on the Forbes Global 2000 list, change is more than just a given. It’s an imperative.  For these massive global organizations, high-stakes moments like mergers and acquisitions, divestitures, expansions, and restructuring all drive growth and innovation. They also present sizable challenges that leave executives asking, “How can…

What you Need to Know: An Update on the GLBA Safeguards Rule

With the expanding scope of cyberattacks on financial institutions and a substantial increase in fraud, government and industry oversight bodies are stepping up with new regulations and requirements to protect consumers. One of the most recent examples are the updates to the Gramm-Leach Bliley Act (GLBA).  After 20 years of regulating information…

10 Tips for Breaking Down the Complexities of Audits & Compliance

In our previous posts for this 5-part series on lifecycle management, we offered various best practices you could implement to better manage identity data, lifecycle processes, and access grants. Today, we’ll review the identity-related challenges surrounding audits and compliance, and offer ten ways to gradually chip away at the complexities of…

Best Practices for Perfecting Dynamic (Yet Secure) Access Grants

Last week, we shared some advice for better managing identity lifecycle processes with some key steps for optimizing full-circle identity processes. In this post, we’ll dig into common challenges surrounding access grants. No matter how mature your access management practices are, IT and security teams are constantly confronted with questions like…

Key Steps for Optimizing Full-Circle Identity Processes

Our last post on identity lifecycle management (LCM) covered common scenarios and actionable tips for perfecting your approach to managing identity data. This week, we’ll review some recommendations for automating employee lifecycle tasks surrounding what’s commonly referred to as “joiner, mover, leaver” (JML) processes. Many IT teams struggle…

How to Navigate Ever-Changing Identity Data

As we discussed in our first post, 4 Ways to Elevate Your Identity Game with Lifecycle Management, one of your first hurdles during an identity initiative often surrounds the management of your identity data. This challenge can be mitigated by moving towards a single source of truth for, not just your employees, but also contractors, partners, and…

4 Ways to Elevate Your Identity Game with Lifecycle Management

All types of companies struggle to keep up with the increasing pace of change in today’s business environment, especially as dynamic workforces become more prevalent. At the same time, employee, partner, and customer expectations for frictionless (but still secure) experiences are soaring. In this 5-part blog series, we’ll review the pivotal role…

What Is Provisioning and Deprovisioning?

Provisioning is the process of making information technology (IT) systems available to users. Depending on your organization’s needs, provisioning can be defined at the network, server, application, and user level: Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…

Archive