Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
The Gartner Hype Cycle while a bit of an oversimplification, is a great tool to understand the evolution of a product or solution space. Gartner describes the hype cycle by placing "visibility" on the "y" axis and "time" on the "x" axis. Visibility of the solution space is greatest early on during the "Peak of Inflated Expectations". The identity space’s inflated expectations and unfulfilled ...
Another Gartner IAM Summit has come and gone and the theme of 2017's conference really followed (and confirmed) what I saw at RSA Conference and the Identiverse (aka Cloud Identity Summit) earlier in the year: It's time to start considering adding intelligence capabilities to your IAM tools, services, and programs.
“Gartner defines unstructured data as content that does not conform to a specific, pre-defined data model. It tends to be the human-generated and people-oriented content that does not fit neatly into database tables.” -Darin Stewart, Gartner When discussing the healthcare landscape, you can scarcely get past the handshake before the looming elephant of unstructured data enters the room. This ...
I recently worked on a project that reminded me of Jim Collins' book Good to Great: Why Some Companies Make the Leap... and Others Don't , particularly the part about getting the the right people "on the bus":
I came across this post by David Maynor, and something really stuck out to me:
In this final part of this 3-part article, we discuss some of the considerations that the CISO of a healthcare organization should take into account as their IAM program gets under way.
In part 1 of this 3-part article, we introduced the macro forces that are driving a shift towards efficiency in healthcare, and argued that these forces will have a direct effect on IAM. In part 2, we speculate on what specific consequences are in store for the coming years.