Dror Arie, Senior Solutions Architect @ GlobalDots
13.09.2021
image 1 Min read

Dror Arie, senior solution engineer at GlobalDots, is a pioneer in employee onboarding automation using IT workflows.

In his Nasdaq guest article, he answers some key questions on one of the most crucial, yet overlooked, elements of employer branding: The employee onboarding experience.

Why is onboarding overlooked in the employee lifecycle?

Employers believe that their efforts should concentrate in the recruiting process, and that, once an employee has been signed, the courtship is over.

Why is this wrong?

With so much capital investments flowing into technology companies, everybody hires all the time. As soon as you welcome a new employee, they are already offered improved rewarding elsewhere. Therefore, retention efforts should start from day-1.

How can technology help?

Workflow automation is one of the hottest IT trends right now. Advanced IAM solutions, like Okta, can automate the IT part of employee onboarding. Synced with HR systems and integrated with all business applications, they can provision and deprovision based on an employee’s team and role, as soon as the employee’s status is updated in the HR system or directory (GSuite, Office365, AD or others). This will:

  • Save the employee the hassle of creating their user accounts upon onboarding.
  • Save manual IT work of permission management
  • Guarantee a tight security posture according to the Least Privilege principle, by immediate deprovisioning of no-longer-needed permissions upon role change or offboarding.

Read More

GlobalDots Partners With Transmit to Make Passwords Extinct
Identity & Access Management (IAM)
Admin Globaldots 08.09.22

As we rely more and more on online services, managing passwords becomes increasingly challenging. Compromised passwords lead to account takeovers, which pose existential threats to customer-facing businesses. Account takeovers led to an estimated $11.4 billion in losses in 2021, caused mostly by compromised passwords. GlobalDots, a cloud innovation leader, partners with Transmit Security, a leading […]

Read more
How To Implement Passwordless Authentication: A Step by Step Guide
Identity & Access Management (IAM)
Miguel Fersen, Senior Cloud Consultant @ GlobalDots 27.07.22

Login details are criminals’ favorite type of data, as they allow complete impersonation of a legitimate user on your system. By successfully compromising an account, an attacker becomes a wolf in sheep’s clothing, appearing completely innocuous until they launch their attack.  One of the most common consequences of cracked credentials is a data breach, the […]

Read more
slider item
Identity & Access Management (IAM)
Dror Arie, Senior Solutions Architect @ GlobalDots 06.06.22

While ransomware, securing the cloud, and sprawling IoT vulnerabilities are keeping our CISO’s up at night, credential phishing is a consistent threat, plaguing their employees. Credential Phishing is the practice of stealing user ID/email address and password combinations, by masquerading as a reputable or known entity or person in email, instant message, or another communication […]

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo