Securing customer information is of the utmost importance.
Knowing everything that goes into implementing an IAM program is a quintessential part of starting one.
In the case for this customer, handling sensitive client data needed to be more automated to secure the... READ MORE
The other day I went to visit a prospect who was evaluating vendors for a digital transformation project. The person heading up the project was a Senior Program Manager.
She was clearly very capable – one of those people who are change agents within an organization.
As soon as I... READ MORE
A rise in web-based applications and risk management solution – such as policy-based compliance and audit management – combined with cost containment are set to drive the global identity and access management (IAM) market…