Securing the Identity Perimeter: An In-Depth Look at SpecterOps and BloodHound Enterprise

I speak to many cybersecurity vendors, some are good, some are not memorable, but others excel. Recently, one company I briefed with stood out to me for its innovative...

IAM RACI

Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.

Develop a Comprehensive IAM Improvement Strategy – Phases 1-4

Use this research to improve the governance and operations of identity and access management at the organization. This blueprint uses the identity lifecycle as a framework...

IAM Program Requirements Gathering Tool

Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.

IAM Program Gap Analysis Tool

Use this tool to conduct a comprehensive assessment of your IAM program and develop a roadmap toward your target state.

Employee Onboarding Process

Use this template to document the current- or target-state IAM processes related to onboarding new employees.

IAM Improvement Strategy Communication Deck

Use this tool to capture the essential elements of your IAM improvement strategy.

Employee Access Change Process

Use this template to document the current- or target-state IAM processes related to managing access when employees change roles.

Employee Offboarding Process

Use this template to document the current- or target-state IAM processes related to offboarding leaving employees.

Beyond Traditional IGA: Lumos Delivers Zero Trust Identity Governance for the Modern Enterprise

As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us