Identity Management Blog

As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment.  On the bright side, these organizations have a very strong security foundation in place for internally hosted applications. The challenge is simply to extend their secure identity “umbrella” beyond the internal environment and into the cloud(s). In effect, creating a hybrid security solution for a hybrid environment – part hosted, part SaaS.
Read More
I was re-reading an oldie-but-goodie, Frank Villavicencio’s blog titled Top 10 Common Pitfalls of an IAM Initiative. For anyone who has been responsible for an enterprise system deployment, especially an enterprise IAM system deployment, the top 10 reads like the 10 Commandments.
We released a new ebook today that shows you how to easily rein in some of that cloud application free-for-all that is happening in your company right now. In a recent survey, 71% of respondents acknowledged using applications that were not sanctioned by IT. The ugly truth is, IT is in the dark when it comes to their SaaS footprint. 
What does marketing have to do with cloud Identity Management?  Quite a bit, it seems. Last week, HMV (a European retailer) laid off 190 employees.  Among those being let go included Poppy Rose, the HMV "Community Manager" who happened to be in charge of their twitter account.  The result?  See for yourself...
What is missing from most IAM roadmaps?
There's no two ways about it. This year's Cloud Identity Summit was another incredible edition that brought together great content and really interesting discussions about the state and future of identity. It is definitely going to be fun watching the amazing community we have in identity use this conference as a platform to make a big impact on cloud identity and identity management in general.
What does it take to wake me from my blogging slumber? I guess it takes someone bashing Identity Management as a security technology that is deployed just for the sake of it.
Part 1 of this 2-part article depicted the “typical” Enterprise IAM environment and contrasted it against a cloud-based IT environment, making the case that they look like mirror images of each other.  In part 2, we will discuss some of the specific challenges that the cloud-based IT environment presents, as they relate to IAM.
At the tune of the legendary Michael Jackson’s “Man in the Mirror”:
Part 1 of this 3-part article defined access governance, and part 2 described some of the unique challenges poised by cloud applications.  In this last part, I provide some recommendations based on our experience bringing cloud applications under governance.