Home > Blog

Staring Down your Data Governance Challenges by Chris Rich

by

With the explosion of unstructured data in most organizations, it will become both increasingly important to determine not only who should have access to what, but also, what’s worth securing. It should come as no surprise that when facing such a herculean task there needs to be some prioritization. To do that, you to need to ask for help from your users. You simply can’t do it alone.  However, it’s not all doom and gloom because new… Read More »

Unlocking Identity Intelligence

by

Identity Intelligence is a term you may have heard lately – and it represents the next level of IAM program maturity, for which many organizations are now aiming. Robust identity intelligence can guide the right access decisions across the identity lifecycle, helping to minimize risk and enable compliance with internal guidelines and external regulations. Doesn’t that sound like it could make your life easier? There are three stages to fully harness the Identity Intelligence that exists in… Read More »

Jump Start your IAM Program Today

by

Is your IAM program stuck in the doldrums? Has it failed to deliver on its promised business value? Are you mired in the quicksand of building (or rebuilding) application connectors or performing too many manual tasks? Take some comfort in the fact that you’re not alone – thousands of organizations worldwide are struggling with exactly the same challenges. Much of the time, this is due to the limitations of the traditional identity management (read: provisioning)… Read More »

How to Embrace Your Organization’s “Identity Crisis”

by

“Can I use my own tablet?” “Is there an app for that?” “Do I really have to create another user name and password?” “Can I access my company’s network when I work from home?” How often do these questions come up at your organization?  I would bet quite often.  As we all know, the world has changed very rapidly with regards to accessing corporate information.  Employees, partners, customers and others need to access sensitive information… Read More »

What’s the Business Value of IAM?

by

As a market discipline, Identity and Access Management (IAM) has matured over the past several years. As vendors (such as RSA Aveksa) have entered the market with more modern offerings, organizations have been able to successfully shift the focus of IAM away from being solely an IT tool to being a system that can deliver concrete business value. Taking a quick step back, provisioning tools (what we historically called “identity management”) were built to help… Read More »

Is Cloud-based IAM right for you?

by

Now that cloud-based Identity and Access Management (IAM) solutions have achieved maturity and market acceptance, you may be wondering whether they’re the right answer for your organization. The right answer is, of course…it depends, just like in business school. However, we can’t leave this hanging — let’s explore what it depends on, and what the key criteria are for making the best decision for your organization.  The first consideration requires developing, validating, and gaining a deep understanding… Read More »

How Ease-of-Use and Flexibility are Improving IAM

by

The launch of Healthcare.gov last October was marred with issues. Users who attempted to navigate the exchange were greeted by a litany of errors so egregious, including login issues, incomprehensible data entry forms, enrollment delays, and outright crashes that signing up proved to be a near impossibility. Things got so bad that one leading publication referred to the government’s website as a “technological disaster.” And although five months later, the site seems to be running much… Read More »

1 2 3 32