Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
The Gartner Hype Cycle while a bit of an oversimplification, is a great tool to understand the evolution of a product or solution space. Gartner describes the hype cycle by placing "visibility" on the "y" axis and "time" on the "x" axis. Visibility of the solution space is greatest early on during the "Peak of Inflated Expectations". The identity space’s inflated expectations and unfulfilled ...
Another Gartner IAM Summit has come and gone and the theme of 2017's conference really followed (and confirmed) what I saw at RSA Conference and the Identiverse (aka Cloud Identity Summit) earlier in the year: It's time to start considering adding intelligence capabilities to your IAM tools, services, and programs.
It has been just over a year since I joined the dark side started IAM consulting. Prior to that, I spent over a dozen years in the daily trenches of IAM–administrating, managing, directing, operating, supporting, justifying, marketing–you name it. Over the past year, I've been part of over a dozen IAM advisory engagements. In no particular order, here is what I've learned:
In the last few weeks I encountered twice a situation that is very telling about our space. We were assisting two of our clients with their vendor selection process. They were in final contract negotiations when the issue around software warranties came up. Their selected vendor offered a 30 day money back guarantee. The challenge these two clients saw with this warranty is that it would ...
Usually when we discuss the value and benefits of IAM consulting we talk about defining objectives and use cases. Helping build consensus in an organization. Defining what an eventual IAM program will look like and cost an organization. Creating an actionable plan and delivering on that plan. There is no doubt that this is primarily what is expected of us, but we do more than that.