BLOG

How Azure AD Falls Short of Identity Governance

How Azure AD Falls Short of Identity Governance

Published: May 3, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Identity Governance – the “Why” and the “What” Is Identity Governance not the same as Identity (and Access) Management? Why not? Technically, what we consider as IAM stems from the need to support network-based access within a corporation, government agency or education facility. This includes tasks like provisioning an identity in Microsoft Active Directory (AD) […]

More
What We’ve Learned About IT Security from Past Network Breaches

What We’ve Learned About IT Security from Past Network Breaches

Published: Apr 18, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

With the rise of cloud connectivity and the remote workforce, the perimeter of enterprise organizations has greatly expanded. We’ve moved on from an original perimeter of endpoints, on-site users, servers, applications and data centers to a new identity perimeter that includes vendors and contractors, personal and mobile devices, remote employees and cloud infrastructure and applications. […]

More
Device Management in the World of Consulting

Device Management in the World of Consulting

Published: Apr 6, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

In light of the Okta frenzy on March 22, 2022, Okta announced that LAPSUS$ posted screenshots they were able to take from a security engineer’s computer. This security engineer worked for third party company Okta works (or worked) with, Sitel. The low down is that LAPSU$$ was able to access a computer used by this Sitel worker, […]

More
Do I Need a Firewall in the Cloud?

Do I Need a Firewall in the Cloud?

Published: Mar 23, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

This blog series will cover architecture decisions that should be considered when migrating to the cloud. This series is written by a team of consultants that have worked with all walks of life in the cloud, from Fortune 50 enterprise to the “born in the cloud” startups, from FinTech to the retail industry. If there […]

More
Sales Spotlight: Courtney Simo

Sales Spotlight: Courtney Simo

Published: Mar 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Favorite iVision Client Engagement Value: I am empowered to go the extra mile for my coworkers, clients and community.  Courtney’s Career Journey:   After graduating from Troy University, I started my professional career in Sales for an IT staffing and rural sourcing company, Optomi Professional Services. I absolutely loved working with my clients to understand their […]

More
Women in Tech 2022

Women in Tech 2022

Published: Mar 8, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

iVision is committed to tapping into our team members’ highest potential and passions, and this allows for an incredible range of perspectives around our team. The women at iVision have been integral in every step of our success, in the past, present and future. Today, we’d like to share some of their stories entering and navigating a […]

More
The Benefits of Cloud-Based Imaging

The Benefits of Cloud-Based Imaging

Published: Feb 25, 2022   |   Author:    |   Category: Blog   |   No Comments

We have all experienced the dread that comes with hearing, “we will need to reimage your computer.” The thought of being down for several days and spending hours ensuring everything is where it is supposed to be is sometimes too much to handle. Thankfully, cloud-based solutions have taken a large part of the headache out […]

More
Least Privileged Access with Terraform

Least Privileged Access with Terraform

Published: Feb 14, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   One Comment

AWS, like most security-minded organizations, strongly recommends following the security practice of least privileged. In some cases, this can be a simple task. A handful of instances may only need to receive HTTPS traffic from an Elastic Load Balancer (ELB), a Relational Database RDS cluster should only be accepting requests from the application servers, etc. […]

More
ServiceNow for IGA?

ServiceNow for IGA?

Published: Feb 7, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

With the complexity, as well as the importance, of identity and access management (IAM) on the rise, it’s important that businesses employ the proper tools. In my previous blog, How is IAM Divided Today?, I break down the distinction between IGA, IAM and PAM. Today, I’ll be sharing just why ServiceNow is not suited for […]

More
A Rumination on Graduation

A Rumination on Graduation

Published: Feb 3, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

I recently read a book about the writing of a book, specifically the Oxford English Dictionary. I am now acutely and somewhat annoyingly aware that every word has a rich history and is constantly evolving. Take the word “graduate” for example. This is a common word that most of us have used in conversation. Did […]

More
How to Navigate the Hiring Process in 2022

How to Navigate the Hiring Process in 2022

Published: Jan 13, 2022   |   Author:    |   Category: Blog   |   No Comments

In today’s world of recruitment, things move at a fast pace. One of the most difficult parts of the hiring process, for both candidates and employers, is misalignment around speed and efficiency of the interview process. What are the important things to consider when structuring a hiring process? As a candidate how can you best […]

More
How We Use BloodHound and How it Can Help Defenders

How We Use BloodHound and How it Can Help Defenders

Published: Jan 10, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

BloodHound, available at bloodhound.readthedocs.io, maps Windows Active Directory permissions to a graph database that lets users trace attack paths using a GUI and a query system. To make that more concrete, BloodHound can answer questions such as: Who is allowed to RDP to Computer132? Which computers does JohnSmith have admin access to? What are all the […]

More