Identity Management Blog

During the early days of the Age of Exploration, it took European navigators 10 years to get past Cape Bojador in Africa. Once they got past it, they must have all wondered why they struggled with it in the first place. Historians blame the delay on winds, currents and legends of sea monsters. Although conditions posed some challenge there really was no excuse for how long it took explorers to round this small cape in Northern Africa.  When they did get past it they quickly made it to the next major geographical and psychological obstacle on the path to riches: the Cape of Good Hope. It seems ...
Read More
The Proof of Concept (POC) is a traditional step in the typical organization’s product evaluation process. Most organizations use a POC to evaluate their product options by seeing how different products perform in their environment. The ultimate objective is to mitigate the risk of a purchase by ensuring that the product is a fit for the organization. Although almost always a part of the product ...
In Part 1 of this series, we looked at how important it is to have documentation of what you expect your system to do and the value of making a plan. Now we want to take a closer look at writing the test cases, themselves.
Anyone who has ever played a part in an Identity Management implementation knows that testing is an essential step in the process, but few understand how to test effectively. There has never been – and will never be – a bug-free implementation. There will always be broken links, inadequate code, and behaviors that simply don’t match what was expected. That’s why we do testing in the first place. ...
Before joining Identropy, I spent most of my career deploying and supporting large IAM programs for large companies. That is where I learned the importance of having a clearly stated strategy (that aligned with the business strategy) and an initiative roadmap. I instinctively knew the strategy and roadmap were essentials.
Here, we will continue the playbook items list that we started in part 2.
In part 1 of this 3-part article, we described the scenarios and motivation for a new approach to IAM that is required for these days.  Here we will start explaining what makes up that new playbook.
Over the past few months, I have come to realize, through empirical observation working with our clients, that the way in which Identity and Access Management (IAM) initiatives are carried forward demands a different approach from what we have seen to-date. I mean this from a holistic view: the drivers, the business justification and the expectations around what IAM should deliver to the business ...
It is very unusual to see the term “business differentiation” being used in the world of Identity and Access Management (IAM), but working with a customer recently, business differentiation was the very topic of our conversation; and yes, it was in the context of IAM – hard to believe, right?
“The Importance of Planning an Identity Management Strategy in Healthcare - A Case Study at South Jersey Healthcare” is the title of the session that I will be co-presenting with François Bodhuin, Technology Director at South Jersey Healthcare, during the NJ-DV HIMSS (Healthcare Information and Management Systems Society) Fall Conference.