Identity

9 Cyber Security Questions Every Executive Should Ask

According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber attacks becomes an almost weekly occurrence, organizations are still struggling to define a security model and determine how […]

9 Cyber Security Questions Every Executive Should Ask Read More »

Core Identity & Access Management Use Cases

Here is a reference list of common Identity & Access Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee through automated HR feed New Non-Employee – Internal (HR feed, workflow request, application of record) New Non-Employee – External (workflow request, application of record)  New Employee

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still

How Identity Management Cuts Costs Read More »

Part 2: Defining Roles for IAM – From the Bottom Up

We believe that a two-pronged approach to roles definition is the key to implementing Role Based Access Control (RBAC) successfully. While there are tools that can automate the ‘bottom up’ approach, the old adage “Garbage In, Garbage Out” applies. If the data that you are basing your role definition on are bad, then a bottom

Part 2: Defining Roles for IAM – From the Bottom Up Read More »

Roles Definition- Part I

Part 1: Defining Roles for IAM – Begin at the Top!

Implementing roles-based access control is invaluable, when implemented correctly.  Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access; allowing the Identity Management solution to grant, modify and revoke access automatically. Just as importantly, roles simplify compliance as well, making it easier to

Part 1: Defining Roles for IAM – Begin at the Top! Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data

Part IV –Good Data Quality drives better Identity Management Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Part II – The 5 Dimensions of Data Quality

Data quality is a term that refers to the reliability and validity of user-level data collected in the Authoritative Systems that feed your Identity and Access Management system (IAM). Quality is measured by how accurately the user data in the system reflects actual information available in the real world. In Part I of this series, we

Part II – The 5 Dimensions of Data Quality Read More »

Part I – Data Quality is the lifeblood of Identity Management (IAM)

At most large enterprises, the IT environment has evolved over decades into an “accidental architecture” with everything from mainframes, PCs, and LANs to the Internet, cloud, and mobile devices, all connected by a poorly tied together patchwork that limits speed, flexibility, and innovation. IAM offers a new model for managing users and devices within the

Part I – Data Quality is the lifeblood of Identity Management (IAM) Read More »

The Identity of Things vs. Traditional IAM

Gartner has coined the term “The Identity of Things “(IDoT) as “a new extension to identity management meant to encompass all identities, regardless of whether it is a person or device”. We like the concept, and our customer have dipped their toes in the waters and started incorporating IoT into their IAM strategies and roadmaps. Here’s

The Identity of Things vs. Traditional IAM Read More »

Scroll to Top