Identity Management Blog

In part 1 of this 2-part article, we described some of the symptoms that are found when the IAM team is perceived as the owner rather than the facilitator of access governance processes.  This article will provide some pointers and suggestions on how to re-focus the program.
Read More
Once upon a time, an organization was confronted with the fact its IT group was consumed in answering auditors' questions, as well finding and resolving issues found by auditors.  The IT group, responsible for the Identity and Access Management (IAM) team was constantly overworked and barely had any cycles to advance their IAM initiative outside of addressing questions and requests from internal ...
2010 has been a very eventful year for identity.   It has been a solid year chock full of M&A activity and innovations – all good signs that Identity and Access Management (IAM) continues to be a vibrant and relevant space in the information security market.  Below are some rants on my perspective of the events in IAM in 2010.
Today, Identropy announced the expansion of its co-sourced Identity Services suite known as SCUID, by adding support for Oracle Identity Manager. SCUID Operations for OIM is an offering that allows customers running Oracle Identity Management as its provisioning infrastructure to outsource the monitoring, management, reporting and issue remediation of OIM to Identropy. SCUID Operations helps ...
The recent acquisition of ArcSight by HP for $1.5B announced this past Monday inspired me to write this blog article (writer’s block is a thing of the past with all of these announcements).  It is exciting to see all of this activity in the information security industry, particularly after an intense prior week in the strong authentication arena.
In part 1 of this two-part article, we provided the context and motivation for organizations to adopt a viable model for handling its IAM infrastructure operations. In this article, we will discuss options available to address this need.
For some time, we have been discussing the advantages of a co-sourced model for Identity and Access Management (IAM).  In this two-part article, I will focus on the first logical step for migrating from a traditional IAM deployment model towards a co-sourced, managed service model: IAM Operations Management.
Today, Identropy, an Identity-enabled solutions provider, announced the public availability of its co-sourced Identity & Access Management (IAM) solution platform known as SCUID (Secure Co-Sourced Unified IDentity).  SCUID is a co-sourced managed services platform that provides a complete suite of Identity & Access Management services that includes Identity Governance and Compliance and Identity ...