ALL

Roles Definition- Part I

Part 1: Defining Roles for IAM – Begin at the Top!

Implementing roles-based access control is invaluable, when implemented correctly.  Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access; allowing the Identity Management solution to grant, modify and revoke access automatically. Just as importantly, roles simplify compliance as well, making it easier to […]

Part 1: Defining Roles for IAM – Begin at the Top! Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data

Part IV –Good Data Quality drives better Identity Management Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Part II – The 5 Dimensions of Data Quality

Data quality is a term that refers to the reliability and validity of user-level data collected in the Authoritative Systems that feed your Identity and Access Management system (IAM). Quality is measured by how accurately the user data in the system reflects actual information available in the real world. In Part I of this series, we

Part II – The 5 Dimensions of Data Quality Read More »

Part I – Data Quality is the lifeblood of Identity Management (IAM)

At most large enterprises, the IT environment has evolved over decades into an “accidental architecture” with everything from mainframes, PCs, and LANs to the Internet, cloud, and mobile devices, all connected by a poorly tied together patchwork that limits speed, flexibility, and innovation. IAM offers a new model for managing users and devices within the

Part I – Data Quality is the lifeblood of Identity Management (IAM) Read More »

The Identity of Things vs. Traditional IAM

Gartner has coined the term “The Identity of Things “(IDoT) as “a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device”. We like the concept, and our customer have dipped their toes in the waters and started incorporating IoT into their IAM strategies and roadmaps. Here’s

The Identity of Things vs. Traditional IAM Read More »

Taking the pain out of User Onboarding with IAM

When a new employee is hired, setting up access to all files, applications, databases and so on is fundamental, because users cannot do anything without it.  And while you’re at it, don’t forget arranging for parking passes, cardkey access, and permissions to enter certain areas of the building. In short, there is a lot that

Taking the pain out of User Onboarding with IAM Read More »

How do you manage non-employee identities?

We were recently asked this question, and managing Non-Employee Identities is a common challenge for organizations when implementing an Identity and Access Management (IAM) solution. We work with a wide range of clients across the Fortune 1000 and this is what we have seen: 1) 80% build a home grown web-based registration form that creates

How do you manage non-employee identities? Read More »

Mitigating the High Cost of Forgotten Passwords

Password resets comprise roughly 30% of all Help Desk calls and not only impact worker productivity, but also consume valuable IT resources from your support team. What if your associates could take charge of how they reset their passwords and eliminate unnecessary calls to the Help Desk? Password self-service based on security questions is the

Mitigating the High Cost of Forgotten Passwords Read More »

Scroll to Top