IDM

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer

Stakeholders are an important asset and are critical to the success of your Identity and Access Management program. Few IT projects have such far-reaching scope as Identity Management (IAM) engagements, touching stakeholders across all business domains. The breadth of IAM’s reach is also its downfall – with new requirements springing up like mushrooms after a […]

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer Read More »

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the

Does your Identity Management Program Pass the ‘Marshmallow Test’? Read More »

4 Identity Management Articles You May Have Missed

  Every two weeks we deliver a curated digest of Identity Management and Cybersecurity News to security leaders, IT professionals, and CISO/CSOs. Based on subscriber feedback, we’ve selected the most popular articles to highlight here.   BitLocker encryption can be defeated with trivial Windows authentication bypass In its own documentation, Microsoft admits that preboot authentication is “unacceptable

4 Identity Management Articles You May Have Missed Read More »

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according to the Project Management Institute, is a lack of alignment between the project and the

How a Solution Roadmap Aligns IT and Business Strategy Read More »

10 Challenges IAM Governance Teams Help Organizations Overcome

The best Identity Management (IAM) practitioners are businesses that have adopted a formal governance structure with defined processes and practices that deliver value. Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently without compromising security or causing a compliance breach. The big pivot here is that Identity Management

10 Challenges IAM Governance Teams Help Organizations Overcome Read More »

Core Identity & Access Management Use Cases

Here is a reference list of common Identity & Access Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee through automated HR feed New Non-Employee – Internal (HR feed, workflow request, application of record) New Non-Employee – External (workflow request, application of record)  New Employee

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still

How Identity Management Cuts Costs Read More »

Roles Definition- Part I

Part 1: Defining Roles for IAM – Begin at the Top!

Implementing roles-based access control is invaluable, when implemented correctly.  Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access; allowing the Identity Management solution to grant, modify and revoke access automatically. Just as importantly, roles simplify compliance as well, making it easier to

Part 1: Defining Roles for IAM – Begin at the Top! Read More »

Part IV –Good Data Quality drives better Identity Management

Most organizations spend many months defining requirements and determining which Identity Management (IDM) solution will help them improve their business, while few pay attention to the data that are critical to running their IDM systems. If your organization is going to invest large sums of money and time building an IDM solution, why is data

Part IV –Good Data Quality drives better Identity Management Read More »

Scroll to Top