I will be honest, the idea for this blog entry came to me as I made a private observation while in a meeting with a client. The scene, a typical office conference room. Seven people huddled around the table discussing the intricacies of building enterprise grade IAM capabilities. All seven of us tapping away on our laptops taking various notes and collaborating with people over a web conference. It was pretty average for a meeting, I would say. What struck me, though, were the laptops. Of the seven in the room, five were MacBooks. For the longest time, it was a Windows world, especially in large enterprises. Over the last couple of years since I joined the dark side (consulting), I have been privy to many conversations and meetings with smart people at all levels with great organizations. Despite having a small overall laptop market share, I am seeing more and more Mac laptops in the enterprise over the last couple of years. This meeting, however, was different in that it was the first time the majority of people in the room were using Mac laptops. Big companies like IBM, GE, Delta and now Walmart have been very public about the IT cost savings they anticipate by letting their users choose a MacOS device instead of Windows.

What’s the point?

Mac’s are part of the enterprise. If not now for yours, it will be soon. Mac machines are accessing organizational resources the same as your Windows (and other mobile) devices. Those resources can be anything from the cafeteria lunch schedule to the super secret plans for your next big thing that will give you a competitive advantage. Mac’s, once the oddball machine in the enterprise because an executive wanted to use it, are growing in numbers. Companies are shifting away from fighting the OS battle and now moving to a “Secure All The Things” approach.

  1. Are you managing your Mac’s with the same rigor and discipline as your Windows devices?
  2. Are your MacOS systems connected to your AD and complying with group and organizational policies?
  3. Do you know who has access to what and does that include your population of Mac users?

If not, it might be time to start thinking about that aspect for your IAM program. Even Microsoft, now a frenemy of Apple, is starting to embrace Apple’s devices and offer their services to Apple users. A good IAM strategy includes all users and devices. If you need help with that, we are here for you.

Map Out Your Strategy & Roadmap

The road to holistic data governance is a long one, and is just a piece of the identity and access management pie. Managing your healthcare organization’s security, usability, and integrity is vital to getting the resources, access, and peace of mind you need in order to drive success and value-based payments.


Building a roadmap is a pragmatic and effective way to steer your organization toward a common goal. Our advisors have decades of experience implementing an actionable IAM program that minimizes the risk of data breaches and uncomfortable information compromises. If you’d like to learn more, feel free to check out our newest whitepaper on “Towards an Identity-Centric Security Strategy:”

Cyber Security Strategy

Jeff Steadman

Jeff Steadman

As part of our advisory practice, I partner with our clients to help plan their IAM strategies. Prior to joining Identropy, I spent over a dozen years managing, building, and running Identity & Access Management programs, projects, and teams for SC Johnson and Walgreens.