Tuebora Blog

Communicate Your IAM Intent Directly to You Applications

In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went on to define them as:

Read More

The goals of any Identity and Access Management (IAM) program are to support an organization’s mission and activities by ensuring that access to data in the organization is granted to the right person at the right time and removed when that access is no longer needed. Identity management teams are challenged to perform this function in the most efficient way possible within the organization’s policies and governing legal requirements. There are three keys to the ongoing success of an identity and access management program.

Read More

Overview
Identity and access management (IAM) is one of the few IT activities where an organization’s security posture and employee productivity are both in play. The same problems that exist for security, IT operations, and other aspects of IT are problems here. There is too much data for human analysts to evaluate quickly, with product sets that don’t proactively react, (there’s a bit of human fear about that).

Read More

You just boarded a transatlantic flight for that well-deserved vacation to the exotic destination, the one that has always evaded you until now. The announcement to turn off all mobile/wireless devices will happen in a few minutes and you are already visualizing being there – the fun and frolic, the experience of soaking in that private island.

Read More

We participated in the 8th annual Gartner Identity & Access Management Summit (Nov 18 – 20, 2013) at Los Angeles. We were also a Silver Sponsor and are excited to gain validation on our offerings and more importantly for being on the right track. Our summaries of findings based on numerous interactions with industry experts as well as attendees from multiple verticals are as follows:

Read More

Have you ever walked into a store to buy something very specific but ended buying a lot more than you actually use or wanted? If you answered yes, chances are that you did not have a choice as what you wanted was packaged as part of something larger. The end result is that the extra stuff not only burnt a big hole in your pocket but also ended up taking “shelf space”.

Read More

So you thought IAG was meant only for large companies that have thousands of employees and hundreds of applications? And IAG should primarily be used for mandated compliance? Not really….at the heart of governance is very simple principle – ensuring that there is a continuous and optimally matched set of identities and resources within the organization. More or less access to resources can result in losses to a business. More access can lead to fraud or misuse, while less access can lead to under-utilized resources or not meeting SLAs.

Read More

Irrespective of what business someone does, it is not easy to figure out the boundaries of access in an Organization. Be it undesired empowerment with excess access or being unable to perform one’s job function because of under access, the pain of figuring out the right access has always been a daunting task. How do I go about solving this?

Read More