Identity Management Blog

The Proof of Concept (POC) is a traditional step in the typical organization’s product evaluation process. Most organizations use a POC to evaluate their product options by seeing how different products perform in their environment. The ultimate objective is to mitigate the risk of a purchase by ensuring that the product is a fit for the organization. Although almost always a part of the product and vendor evaluation process, POCs should be reconsidered because they are costly and deliver very limited value.
Read More
It’s par for the course in enterprise IT that when game-changing technologies hit the mainstream, the many benefits they offer are accompanied by a new set of unforeseen IT risks.  It’s the way of the world, and while you may not be able to account for the unknown, if you anticipate that there will be surprises, you can ensure that the benefits of any given innovation will far outweigh the risks.
Before joining Identropy, I spent most of my career deploying and supporting large IAM programs for large companies. That is where I learned the importance of having a clearly stated strategy (that aligned with the business strategy) and an initiative roadmap. I instinctively knew the strategy and roadmap were essentials.
Wired has the kind of article that will make all of us leading highly digitized lives (is that the right term?) wake up in a cold sweat. While the title - How Apple and Amazon Security Flaws Led to My Epic Hacking - may strike many as sensationalist, the article does a good job of showing just how the rappel ropes of our digital lives have mushroomed into a beast that we can't manage or hardly ...
Here, we will continue the playbook items list that we started in part 2.
In part 1 of this 3-part article, we described the scenarios and motivation for a new approach to IAM that is required for these days.  Here we will start explaining what makes up that new playbook.
Over the past few months, I have come to realize, through empirical observation working with our clients, that the way in which Identity and Access Management (IAM) initiatives are carried forward demands a different approach from what we have seen to-date. I mean this from a holistic view: the drivers, the business justification and the expectations around what IAM should deliver to the business ...
One of the hardest cases to make for any CTO or CIO is that reducing helpdesk calls or saving users 45 seconds per login is a true cost save. Typically referred to as “soft savings” they are considered inferior to “hard savings”. Hard savings are judged by the qualifier “how many people can I fire? … give me names.” It is now more important than ever for organizations to drive efficiency to ...
A few months ago, I wrote a few blogs about trends in Healthcare and why these were making Identity a top of mind issue in the Healthcare sector.
As we continue to evolve our advisory services offerings, namely our Kickstart program, we recognize that, in addition to helping clients figure out their Identity and Access Management (IAM) strategic roadmap, governance model, and implementation approach, our customers increasingly look to us for advice about best practices and practical advice on how they can improve the success of their IAM ...