This year conferences went virtual and while this meant that we could attend events without pants, it also means not bumping into old friends and sharing ideas over a meal. This year Identiverse is a hybrid event with an in-person and a virtual component.Read More
In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went on to define them as:Read More
The goals of any Identity and Access Management (IAM) program are to support an organization’s mission and activities by ensuring that access to data in the organization is granted to the right person at the right time and removed when that access is no longer needed. Identity management teams are challenged to perform this function in the most efficient way possible within the organization’s policies and governing legal requirements. There are three keys to the ongoing success of an identity and access management program.Read More
Identity and access management (IAM) is one of the few IT activities where an organization’s security posture and employee productivity are both in play. The same problems that exist for security, IT operations, and other aspects of IT are problems here. There is too much data for human analysts to evaluate quickly, with product sets that don’t proactively react, (there’s a bit of human fear about that).