Identity Management Blog

Building consensus for your IAM program and turning it into an enterprisewide initiative is critical to its success. Our team recently had an onsite meeting with the CIO, CSO, CTO and ten or so other key players to review our joint progress on their IAM implementation. We reported that we were on task and under budget but that we had identified a significant risk to the project. The risk we were facing was that Human Resources was neck deep in rolling out a new HR system and that they were unwilling to collaborate with the IAM team until sometime in January. During the meeting, we highlighted ...
Read More
Being an Identity and Access Management consultant is cool. I get to work with clients big and small across various industries. I run into new challenges each time and I love developing innovative approaches to solving these challenges. But as fun as it is to innovate, there are certain undeniable truths in IAM that provide the foundation for good advice.
Identity and access management (IAM) is a lot of work. A lot of work to get off the ground and a lot of work to keep it going. One of the concerns that I hear often when advising customers revolves around how much effort it is going to take to get their IAM program into a more mature state.  The answer tends to be a lot.
As both enthusiasts and advocates for identity and access management and access governance, we see big changes coming this year. To briefly reflect on 2015, it was full of development and reevaluating what compromises must be made to acquire a fully functional and secure enterprise. For some, it meant outside help; for others, finally admitting that IT is only a fraction of what’s needed to ...
Identropy will be attending Courion’s 13th annual customer conference, Converge 2015. Converge is a user conference strictly dedicated to Identity and Access Management (IAM). The event will cover an abundance of information to help you design your management roadmap, ensure you are using the most efficient tools and secure user access throughout your organization.
Understanding the evolution of the Identity and Access Governance (IAG) space is helpful when determining the value of an identity initiative to your organization. Our industry loves buzzwords and we tend to move in packs, if not herds. By taking a look at the evolution of IAG we can better understand why certain topics are hot. Armed with this knowledge we can determine whether those hot topics ...
Continuing where we left off last week, this post takes a deeper look at access controls and the types of authorizations that can be implemented.  Authentication, Authorization, and Accountability (AAA) Identity management has become a separate consideration for access control. However, the three pillars that support authorized access still define the tools and techniques necessary to manage who ...
Privileged IDs are sometimes referred to as the “keys to the kingdom.” It’s a very accurate description since privileged accounts often have the highest level of access to make changes to applications, infrastructure and data. Compounding the risk is that many organizations have not deployed tools to monitor and mitigate the risk posed by privileged IDs.
A few days ago, a customer asked us if we had a document with Identity and Access Management (IAM) acronyms. This exercise made us collaborate in compiling an updated list of commonly used acronyms, which I felt would make a good contribution to the identirati.