Process

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according to the Project Management Institute, is a lack of alignment between the project and the …

How a Solution Roadmap Aligns IT and Business Strategy Read More »

Core Identity & Access Management Use Cases

Here is a reference list of common Identity Management Use Cases: Create User Initial Population of Users in ID Store (Data seeding for existing users) New Employee Hire through Automated HR Feed New contractor hire (workflow, database, or system feed) Modify User Transfer to Another Department Organizational Info Change (Manager, Department, Job Code, etc.) End …

Core Identity & Access Management Use Cases Read More »

How Identity Management Cuts Costs

Identity & Access Management (IAM) solutions aren’t new. Most large organizations have implemented some form of IAM and realized dramatic savings in managing the user lifecycle from the user’s creation to separation. The real driver goes beyond cost because end user productivity and security are greatly enhanced as well. Yet a number of organizations are still …

How Identity Management Cuts Costs Read More »

Part III- Four Strategies to Assess Data Quality for Identity Management

Identity Management (IDM) systems rely on accurate user data in order to manage user access, enforce policies, and support network security. Historically, organizations have not had a good grasp on the required data profile of their user populations, including employees, contractors, partners, and vendors. In fact, many organizations know very little about their contractor populations …

Part III- Four Strategies to Assess Data Quality for Identity Management Read More »

Taking the pain out of User Onboarding with IAM

When a new employee is hired, setting up access to all files, applications, databases and so on is fundamental, because users cannot do anything without it.  And while you’re at it, don’t forget arranging for parking passes, cardkey access, and permissions to enter certain areas of the building. In short, there is a lot that …

Taking the pain out of User Onboarding with IAM Read More »

Implementing Identity Management – Two Steps Forward, One Step Back

Can an Identity Management (IDM) project degrade a company’s provisioning performance? In a word, yes! You may be asking yourself how this is possible, when we would expect that linking to the HR system and automating routine provisioning tasks would actually enhance service. While that is the ultimate goal of the IDM solution (integration and …

Implementing Identity Management – Two Steps Forward, One Step Back Read More »

Scroll to Top