Identity Management Blog

If you have ever hired a Professional Services team to do an integration project, you know that it takes planning and tenacity to pull it through to the end. Depending on the breadth of the integration, the difficulty of accomplishing this varies. So, what makes an Identity Management integration project so special that I would take time to write about it and think you may deign to read it?
Read More
You may have heard that we launched a new SaaS Advisory offering this week. As part of this process, we've generated some methodology and some tools that we wanted to share with you. Some of these have been available from our website for several weeks, and we've just published some new ones, so we wanted to pull them all together into a DIY kit.
We released a new ebook today that shows you how to easily rein in some of that cloud application free-for-all that is happening in your company right now. In a recent survey, 71% of respondents acknowledged using applications that were not sanctioned by IT. The ugly truth is, IT is in the dark when it comes to their SaaS footprint. 
Part 1 and Part 2 describe the evolution of our thought process as we become an IDaaS solution provider. In part 3 I provide the two more lessons that have helped us shape our approach. Do you really need to be that unique?
In part 1, I started by sharing two important lessons in our journey to becoming an IDaaS solution provider, namely avoid Cloudwashing and don’t forget about the on-prem apps. In part 2, we will focus on two additional lessons. Start with identity, not with SSO In  several occasions before, I have stated that Single Sign-On (SSO) should be the by-product of doing identity and access management ...
Over a year ago, Nishant Kaushik, our Chief Architect and well-known identirati, posted a blog, which I think is very relevant today. It focused on the notion that in order to truly accelerate identity management (IDM) deployments, effectively reducing customer’s time-to-value (TTV), one needs to focus on a limited set of use cases, and optimize the solution for a well-defined user audience.
Part 1 of this 2-part article depicted the “typical” Enterprise IAM environment and contrasted it against a cloud-based IT environment, making the case that they look like mirror images of each other.  In part 2, we will discuss some of the specific challenges that the cloud-based IT environment presents, as they relate to IAM.
At the tune of the legendary Michael Jackson’s “Man in the Mirror”:
Part 1 provided context for the Enterprise IAM consumerization trend and talked about the positive and negative implications of the trend. In this article, I will discuss additional considerations and recommendations about this trends and how organizations may choose to approach it.
  I would like to express my sympathy to those affected by the terrible earthquake and tsunami that hit Japan this past Friday 3/11/2011.  This has been a terrible tragedy, and I can only hope that things begin to get to a stable state. By now, I figure everyone is familiar with the trend of “Consumerization of Enterprise IT.”   It is clear the Enterprise is being forced to adapt to change due to ...