top of page


Stryker Attack: A PAM-less Disaster
Stryker Attack: An Identity Security Attack In times of war, missiles and drones are not the only deadly weapons. Sometimes, it comes silently—through a login. A single cyberattack can do so much damage that its recovery takes ages, a ton of money, and, more importantly, the reputation. On March 11, 2026, Stryker , a global medical technology giant, met with a manmade disaster. Reported to be linked with the Iranian hacktivist persona, named Handala , associated with Iran’s M
Mar 274 min read


Privileged Access Management (PAM) Implementation For Enterprise
Onboarding 20,000+ accounts using ARCON PAM Different kinds of identities, either human or non-human, are essential to manage in any organization with a hybrid environment. If privileged access is unchecked, then it invites cybersecurity risks, exposure to audit failure, and operational dependency on shared credentials. Our team at IDMEXPRESS successfully executed a large-scale Privileged Access Management (PAM) implementation using ARCON PAM that involved onboarding over
Mar 134 min read


Identity Transformation Using SailPoint
SailPoint Transforming Digital Identities Feeling truly happy, overwhelmed (in the best way), and deeply grateful today. Journeys like this remind me why we do what we do. What started as a conversation around modernizing identity for Pima Community College District soon became a powerful collaboration built on trust and a shared vision. Moving away from legacy systems comes with a lot of challenges, some known and unknown, but change, when driven by purpose, always leads to
Mar 51 min read


PAM Solutions by Industry: How to Choose the Right Platform?
FINANCIAL SERVICES | HEALTHCARE | MANUFACTURING | SAAS Choosing a Privileged Access Management (PAM ) platform sounds straightforward — until you realize how different security priorities look from one industry to another. A bank preparing for a SOX audit is solving a very different problem than a SaaS startup pushing daily code releases. Teams in regulated sectors focus on different things. Some are all about keeping super-detailed audit trails, others prioritize locking dow
Feb 186 min read


Unlocking Enterprise Security: The Ultimate 2026 SaaS PAM Solutions Comparison
The Ultimate 2026 SaaS PAM Solutions Comparison Privileged Access Management (PAM) is rarely top of mind until something goes wrong. A failed audit. An uncomfortable insurance questionnaire. A leaked admin credential that forces a late-night incident call. Not long ago, PAM was treated as a specialized security control, important but rarely urgent. That has changed. As organizations move more critical systems into the cloud, the number of privileged credentials, admin accoun
Feb 1317 min read


Governing Non-Human Identities in the Age of AI
Governing Non-Human Identities in the Age of AI The Identity Governance and Administration (IGA) world is observing a major change from a manual, rule-based approach to an intelligent, adaptive, and predictive approach. The reason behind this evolution is mainly brought about by artificial intelligence (AI), from reactive to proactive security. To understand this evolution better, it is important to know the difference between IGA with and without AI. IGA without AI Tr
Jan 213 min read


Delinea and StrongDM: A Necessary Acquisition in the Privileged Access World
Delinea and StrongDM Acquisition After spending close to two decades working around identity, access, and privileged security, very few acquisitions genuinely feel necessary . The Delinea – StrongDM one does. Here’s why. The identity problem we are dealing with today is not the same one we had even five years ago. It’s no longer just admins and users. It’s service accounts, pipelines, APIs, workloads, and now AI agents — all needing access, all creating risk. For years, PA
Jan 162 min read


Migrating from SailPoint IdentityIQ to SailPoint Identity Security Cloud
Migrating from SailPoint IdentityIQ to SailPoint Identity Security Cloud One of our customers, since 2016 relied on SailPoint IdentityIQ to manage identity governance across its organization. As years passed and the IT world evolved, maintaining on-prem infrastructure became resource-intensive. This led to the creation of space for more specialized staff, system upgrades, and manual handling. The problem was clear: an on-premises model made sense when the world was on-prem,
Jan 143 min read


Preventing Cybersecurity Incidents Through Managed Services
PAM Implementation and Managed Services The supply chain industry is growing globally, and goods are manufactured, shipped, and delivered regularly. However, in parallel, cyber threats are evolving and increasing to keep up with the pace of this growth. In 2025, supply chain cyberattacks have doubled compared to last year, now striking nearly 26 times every month across industries . These aren’t just numbers; they represent businesses brought to a standstill, reputations thre
Oct 15, 20253 min read


Don’t Let Your AI “Go Rogue”: A Practical Control Plan for Agentic AI
Agentic AI promises huge ROI — until it acts outside a human identity or exfiltrates data. This article covers the importance of governance, the risks involved, and tools to leverage for incorporating controls into your agentic AI builds. Here’s the step: a compact, audit-ready control plan for boards and CISOs that they can actually use. READ MORE!
Sep 29, 20254 min read


PACBot: An AI-Driven Compliance Bot for CyberArk and ServiceNow Integration
PACBot: Automating CyberArk & ServiceNow Compliance In present times, Privileged access has become a prime target for attackers to exploit an organization in different ways. So this is the time when organizations need more than just reactive security. Acknowledging the need, PACBot entered the market to provide an intelligent automation solution . PACBot stands for Privileged Access Compliance Bot , a lightweight AI agent bridging the gap between CyberArk and ServiceNow .
Aug 25, 20252 min read


CyberArk’s Privilege Cloud
CyberArk's Privilege Cloud In today’s digital era, machine identities outnumber human identities in the ratio of 80:1. With this, security threats are challenging organizations by targeting their sensitive data and access at a rate like never before. To help prevent these attacks, CyberArk’s Privilege Cloud is the top choice by leaders in the PAM market. CyberArk’s Privilege Cloud dominates 38% of the PAM market. To know what makes it a dominant player in the PAM market, we
Aug 6, 20252 min read


AI's Impact In CyberArk’s Acquisition!
CyberArk's acquisition by Palo Alto Networks
Aug 5, 20253 min read


CyberArk's Acquisition & its Impact on the PAM Industry
CyberArk & Palo Alto Networks' Merger Palo Alto Networks' acquisition of CyberArk for $25 billion is the biggest announcement reshaping the very future of the digital defense system . This bold move will change how different organizations will approach cybersecurity in the AI era. Palo Alto Networks is a popular name, recognised as a l eader in network, cloud, and AI-driven security . CyberArk stands tall in privileged access management (PAM) and identity security . Toget
Aug 1, 20253 min read


Universal Session Management Connector for Web-based Applications
Universal Session Management Connector Our company, IDM EXPRESS , has been working with a lot of different clients across industries, helping them with their custom security requirements . Once, a client came to us with a unique requirement. What the client needed was onboarding over a thousand web-based applications into BeyondTrust for secure Privileged Session Management. It was a task for us to create a session management connector, as this required integrating each app
Jul 18, 20252 min read


CyberArk Success Story: Securing AWS for An Oil & Refinery Customer
CyberArk Preventing Security Risks in An Oil & Refinery Customer Organizations across industries are depending on cloud infrastructure for regular operations. Today, we are narrating the story of a leading oil and refinery company . The company initially faced a lot of criticism and backlash for security issues , but was later saved by CyberArk Secure Cloud Access (SCA) . What was the challenge? Any business that depends heavily on its own AWS cloud for supporting core bu
Jul 16, 20252 min read


Delinea: On-Prem or Cloud?
Strengthen Enterprise Access Security with Delinea Secret Server Delinea Secret Server is a popular name in the industry, opted for by a lot of companies across industries . However, before choosing any platform, thorough research and analysis are a must. We have been working closely with the Delinea Secret Server for quite a long time now, on different environments, whether it is on-prem or cloud . There were a lot of projects we worked on, and we also faced several challe
Jul 7, 20253 min read


Automating MongoDB Password Rotation through A Script: Our Recent Innovation
Automating MongoDB Password Rotation Our organization, IDM EXPRESS , has been working with numerous clients across various industries. However, one of the major challenges we recently encountered was managing password rotation for MongoDB databases. Usually, MongoDB password rotation is completely manual , which takes a lot of time, invites human errors , and is a tedious task , making it harder to manage . Taking this as an opportunity, with the efforts of our internal sec
Jun 24, 20253 min read


Banking Client Case Study: Overcoming Security Challenges - A Custom Oracle-PAM Integration Story
Custom Oracle PAM integration to overcome security challenges in the banking sector
Jun 23, 20253 min read


CyberArk Secrets Hub: A Perfect Secret Management Solution
CyberArk Secrets Hub: A Perfect Secret Management Solution Today's technological advancements have created a multi-cloud world with even bigger and riskier cyber threats than you can imagine. After making all the possible guesses that could rank number one, the secrets scattered across isolated systems top the list. Let's discuss the challenges first: Many enterprises still manage usernames, passwords, and credentials across isolated “security islands” rather than through
May 6, 20252 min read
bottom of page
