Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
Forbes Magazine recently ran an interview with Marc Chernoff, co-author of a personal development blog that has had an impact on me (which surprised me because I usually find self help material to be an interesting read but containing little lasting value). After reading the interview I decided to apply the lessons to the management of an Identity and Access Management program in order to see if ...
The Proof of Concept (POC) is a traditional step in the typical organization’s product evaluation process. Most organizations use a POC to evaluate their product options by seeing how different products perform in their environment. The ultimate objective is to mitigate the risk of a purchase by ensuring that the product is a fit for the organization. Although almost always a part of the product ...
For many years now, the Identirati have talked about the many reasons why Identity and Access Management (IAM) projects fail. Close to three years ago, we created our top ten pitfalls of an IAM initiative, which was the precursor to our advisory services business.
Part 1 and Part 2 describe the evolution of our thought process as we become an IDaaS solution provider. In part 3 I provide the two more lessons that have helped us shape our approach. Do you really need to be that unique?
In part 1, I started by sharing two important lessons in our journey to becoming an IDaaS solution provider, namely avoid Cloudwashing and don’t forget about the on-prem apps. In part 2, we will focus on two additional lessons. Start with identity, not with SSO In  several occasions before, I have stated that Single Sign-On (SSO) should be the by-product of doing identity and access management ...
Over a year ago, Nishant Kaushik, our Chief Architect and well-known identirati, posted a blog, which I think is very relevant today. It focused on the notion that in order to truly accelerate identity management (IDM) deployments, effectively reducing customer’s time-to-value (TTV), one needs to focus on a limited set of use cases, and optimize the solution for a well-defined user audience.
Here, we will continue the playbook items list that we started in part 2.