11 Questions to Consider While Evaluating an IAM Solution

Identity and Access Management (IAM) is a critical part of IT security as it manages user identities, access to data, and permissions to handle resources within an organization. Despite sophisticated cybersecurity programs, threats and data breaches are increasing at an alarming rate, which is why enterprises must deploy an effective IAM solution to safeguard their…

Enterprise Hybrid Cloud Migration Pros & Cons

What is Enterprise Hybrid Cloud? When we talk about enterprise hybrid cloud, we refer to the combination of one or more public and private clouds (such as On-premise Active Directory ) or hybrid cloud to create a single solution for an organization’s computing data. In simpler words, a hybrid cloud infrastructure enables businesses to back-up…

Self service password reset

The Value of Self-Service Portal in a Shadow IT World

When “Shadow IT” no longer lives in the shadows, it’s time to embrace the technical value! Users can bring this value by utilizing the IT-sanctioned self-service tools. The advent of the cloud has invigorated the notion that users can do a lot of things themselves without the help of IT. Originally referred to as “Shadow…

Six Degrees of IT Separation

Six Degrees of IT Separation

We are all well aware of the theory that every person is separated from everyone else by only six people. In fact, one 2013 study showed that this separation was just a little over 3.5 people. Although not as widely recognized, there is also a degree of separation between the people in IT who establish…

Have an IAM Project?

Groups are your cornerstone You cannot build your identity house without a solid identity foundation. Have you ever found yourself with an idea that grows in scope until the original idea has morphed into one that does not accomplish the original intention of the idea? This type of scope bloat is typical for many IT…

Identity Crisis

The Case for Linked Identities I am but one person and my computer does not recognize me. That is the feeling many get while attempting to attest to some application or service. Keeping your identity protected is necessary and we do this typically behind a password firewall that verifies we are who we say we are.…

project database

What are Identity Management Solutions?

Defining identity management exactly is an interesting question.  In many ways the definition is completely different from organization to organization and vendor to vendor.  Wikipedia (the authoritative source of collective watered down wisdom) says: Identity management is a broad administrative area that deals with identifying individuals in a system and controlling access to the resources…

project database

Ten ways IT is like football

I am a huge college football fan. It’s the NFL playoffs, and now, because the BCS National Championship game is taking forever all I can think about is football. It’s so bad that I have cobbled together ten ways that IT is like football… 10.  Without proper attention agile and nimble can easily become slow…

project database

How to Avoid Flaws in Identity Management

David Bell wrote an interesting piece in Secure Computing on how to avoid flaws in Identity Management.  The part that I really liked was how he pointed out that the IT security industry is focusing its efforts on “where” enterprises keep their critical data instead of “who” has access to it. It is this “who”…