Tuebora Blog

Communicate Your IAM Intent Directly to You Applications

Using IAM to Eliminate Barriers to Business Productivity

 

Within a complex modern corporate network, properly managing user identities is both a productivity challenge and an opportunity. The challenge is to meet that core security aim of securely managing user access while balancing that with providing the right people with the right access at the times they need it. This article describes the central role a robust identity and access management strategy and solution plays in balancing security with productivity. 

Read More


There are only two times that all the people in your organization have the right level of access to the data, applications, and systems in your company—before they join the company and just after an audit. In between audits, inefficient identity and access management can increase the likelihood of having orphaned accounts. This article informs you about orphaned accounts and their dangers. 

Read More

The Tuebora team had a great week at Identiverse hosted in beautiful downtown Boston, MA. Although Samuel Adams failed to show up in person, that did not dissuade many other IAM professionals from around the world from coming out. There was a lot to see and hear this year in terms of content from a variety of speakers and a great sampling of vendors from the IAM industry present on the show floor.

Read More

The goals of any Identity and Access Management (IAM) program are to support an organization’s mission and activities by ensuring that access to data in the organization is granted to the right person at the right time and removed when that access is no longer needed. Identity management teams are challenged to perform this function in the most efficient way possible within the organization’s policies and governing legal requirements. There are three keys to the ongoing success of an identity and access management program.

Read More

Overview
Identity and access management (IAM) is one of the few IT activities where an organization’s security posture and employee productivity are both in play. The same problems that exist for security, IT operations, and other aspects of IT are problems here. There is too much data for human analysts to evaluate quickly, with product sets that don’t proactively react, (there’s a bit of human fear about that).

Read More

You just boarded a transatlantic flight for that well-deserved vacation to the exotic destination, the one that has always evaded you until now. The announcement to turn off all mobile/wireless devices will happen in a few minutes and you are already visualizing being there – the fun and frolic, the experience of soaking in that private island.

Read More