IAM

Mastering Identity Management: Challenges in Selecting an IAM Solution

Identity Management solutions have evolved dramatically over the last 10 years, with numerous new entrants into the marketplace. The good news is that cost conscious and proprietary-wary companies have several mature and emerging choices available both via the Cloud and Open Source solutions. With these newer options, the question becomes a bit larger than just […]

Mastering Identity Management: Challenges in Selecting an IAM Solution Read More »

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer

Stakeholders are an important asset and are critical to the success of your Identity and Access Management program. Few IT projects have such far-reaching scope as Identity Management (IAM) engagements, touching stakeholders across all business domains. The breadth of IAM’s reach is also its downfall – with new requirements springing up like mushrooms after a

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer Read More »

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the

Does your Identity Management Program Pass the ‘Marshmallow Test’? Read More »

4 Identity Management Articles You May Have Missed

  Every two weeks we deliver a curated digest of Identity Management and Cybersecurity News to security leaders, IT professionals, and CISO/CSOs. Based on subscriber feedback, we’ve selected the most popular articles to highlight here.   BitLocker encryption can be defeated with trivial Windows authentication bypass In its own documentation, Microsoft admits that preboot authentication is “unacceptable

4 Identity Management Articles You May Have Missed Read More »

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according to the Project Management Institute, is a lack of alignment between the project and the

How a Solution Roadmap Aligns IT and Business Strategy Read More »

10 Challenges IAM Governance Teams Help Organizations Overcome

The best Identity Management (IAM) practitioners are businesses that have adopted a formal governance structure with defined processes and practices that deliver value. Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently without compromising security or causing a compliance breach. The big pivot here is that Identity Management

10 Challenges IAM Governance Teams Help Organizations Overcome Read More »

Core Identity & Access Management Use Cases

Here is a reference list of common Identity & Access Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee through automated HR feed New Non-Employee – Internal (HR feed, workflow request, application of record) New Non-Employee – External (workflow request, application of record)  New Employee

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still

How Identity Management Cuts Costs Read More »

Scroll to Top