Mobile Search Mobile Menu

By Jayne Hallock

First, Again: Simeio Makes the RSA Archer Connection!

Have you connected your Archer today? Simeio has! We don’t mean to brag – but Simeio nabbed another “first” and we’re thrilled to be able to say so. In fact, we’re going to be presenting on this first at RSA Techfest this week! So what exactly did we accomplish? Without getting too technical, we were […]

By Jayne Hallock

Simeio Nominated as RSA’s Overall Partner of the Year!

We’re thrilled to say the words “It’s an honor to be nominated!” This month, RSA announced that Simeio Solutions has been nominated for their prestigious “Americas Partner of the Year” for 2016-2017. As if that wasn’t exciting enough, we were nominated in the Overall Partner of the Year category. The winners will be announced in Orlando on September […]

By Jayne Hallock

Understanding Identity Policies: 5 Best Practices

As an increasing number of organizations are required to comply with industry regulations, the need for access governance has grown. Through access governance, IT and security management can reduce the risks associated with incorrect or unnecessary end user access to sensitive data. The best way to keep your network secure is to ensure that the […]

By Jayne Hallock

New! “State of Identity” podcast about Privileged Account Management trends

In this educational new “State of Identity” podcast, host Cameron D’Ambrosi leads Simeio’s own Shawn Keve and Abhimanyu Yadav in a discussion about Privileged Identity Management. This enlightening thirty minutes covers: ~ Why privileged account management is different – and more vulnerable – than end user identity management ~ How the definition of PIM is […]

By Jayne Hallock

The Top 5 Mistakes That Threaten Your Security

“Mistakes were made” may be the most common PR response coming from an enterprise, when their security has been breached. It’s also the most  diplomatic…and least helpful response.  Why couldn’t these mistakes been spotted much earlier? Before PR spin was ever needed? Following a data breach, hack or other compromise to infrastructure or assets, a post-mortem […]

By Jayne Hallock

May I CIAM Your ID? 8 Tips for a Wildly Successful Consumer IAM Implementation

There’s a new IAM in town. A hipper, often fancier IAM. It’s called customer identity and access management (CIAM). And it’s helping all kinds of businesses improve their bottom lines, each and every day. What’s CIAM and why should you care? CIAM handles not only internal IAM (the identity and access management for your employees, […]

By Jayne Hallock

How to Stay Off CNN: 5 Ways To Rethink IAM (& Avoid Security Breaches)

Every business worries about it these days.  Some lose sleep over it. All across the globe, in every industry,  people are anxious that one fateful day, they’ll see their company name on TV. They fear that sickening feeling of hearing their business discussed on CNN, for all the wrong reasons.  Finally getting great free PR…for […]

By Jayne Hallock

Meet the Next Generation of Cyber Warriors, Part Three of Three

This Spring, we attended the Southeast Regional Cyber Defense Competition, hosted at nearby Kennesaw college. For two grueling days, teams of college students faced off against fake hackers that were attempting to compromise each team’s fake company. Exhausting, exhilarating, endless challenges. After the competition closed out, everyone met for a delicious and de-stressing luncheon. There […]

1 2 3