Identity Management Blog

Here, we will continue the playbook items list that we started in part 2.
Read More
In part 1 of this 3-part article, we described the scenarios and motivation for a new approach to IAM that is required for these days.  Here we will start explaining what makes up that new playbook.
Over the past few months, I have come to realize, through empirical observation working with our clients, that the way in which Identity and Access Management (IAM) initiatives are carried forward demands a different approach from what we have seen to-date. I mean this from a holistic view: the drivers, the business justification and the expectations around what IAM should deliver to the business ...
As we continue to evolve our advisory services offerings, namely our Kickstart program, we recognize that, in addition to helping clients figure out their Identity and Access Management (IAM) strategic roadmap, governance model, and implementation approach, our customers increasingly look to us for advice about best practices and practical advice on how they can improve the success of their IAM ...
Earlier this year, I published a blog article entitled Approaches to Identity-as-a-Service (IDaaS) for Enterprise Identity Management.  In this article, I will focus on the advantages of one of the approaches discussed: co-sourced IDaaS (a.k.a.  identity management co-sourcing), and, more specifically, the 3 model or "Hybrid: on-premise and in the cloud".
In part 1 of this 2-part piece I introduced and defined some of the terms relating to identity assurance. In this last piece I intend to illustrate identity assurance's intersection with real-life through some examples.
In this 2-part article, I hope to explain the importance of identity assurance in everyday life. I will first level set on terms and definitions in part 1, and then illustrate with real-life examples in part 2.