There are only two times that all the people in your organization have the right level of access to the data, applications, and systems in your company—before they join the company and just after an audit. In between audits, inefficient identity and access management can increase the likelihood of having orphaned accounts. This article informs you about orphaned accounts and their dangers.
This year conferences went virtual and while this meant that we could attend events without pants, it also means not bumping into old friends and sharing ideas over a meal. This year Identiverse is a hybrid event with an in-person and a virtual component.Read More
In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went on to define them as:Read More
We participated in the 8th annual Gartner Identity & Access Management Summit (Nov 18 – 20, 2013) at Los Angeles. We were also a Silver Sponsor and are excited to gain validation on our offerings and more importantly for being on the right track. Our summaries of findings based on numerous interactions with industry experts as well as attendees from multiple verticals are as follows:Read More
Have you ever walked into a store to buy something very specific but ended buying a lot more than you actually use or wanted? If you answered yes, chances are that you did not have a choice as what you wanted was packaged as part of something larger. The end result is that the extra stuff not only burnt a big hole in your pocket but also ended up taking “shelf space”.Read More
So you thought IAG was meant only for large companies that have thousands of employees and hundreds of applications? And IAG should primarily be used for mandated compliance? Not really….at the heart of governance is very simple principle – ensuring that there is a continuous and optimally matched set of identities and resources within the organization. More or less access to resources can result in losses to a business. More access can lead to fraud or misuse, while less access can lead to under-utilized resources or not meeting SLAs.Read More
Irrespective of what business someone does, it is not easy to figure out the boundaries of access in an Organization. Be it undesired empowerment with excess access or being unable to perform one’s job function because of under access, the pain of figuring out the right access has always been a daunting task. How do I go about solving this?Read More