Category: Identity Management
-
‘No Sweat’ User Provisioning Software for Identity and Access Management… Even in Winter
Automate identity and access management user provisioning. Winter is not generally associated with people sweating, even in Duluth, Georgia, where high temperatures today were slated to dip into the 40’s. If you’re one of the top 100 hospitals in the United States, though, and handle more than 11,000 transfer requests per quarter, nobody would blame…
-
Reduce Identity and Access Management Risks with a Holistic Needs Assessment
Assess technology and business needs. I’d like to think that I can figure out just about anything with technology, but from time to time I have to step back and think if my fresh research on a topic would truly be comprehensive enough to solve the organizational problem at hand. This is even more relevant in…
-
2012: A Year of Identity Management Innovation at Avatier
A year of identity management innovation. Should old acquaintance be forgot, and never brought to mind? Should old acquaintance be forgot, and old lang syne? Yes, it’s hard to believe that tonight we’ll be singing that traditional New Year’s Eve tune as the ball drops in historic Times Square in New York City. It is…
-
CIOs Heads Not in the Cyber Security Cloud
Cloud computing cyber blues. BREAKING NEWS: THE PRESTIGIOUS CONSULTING FIRM, ERNST & YOUNG, RECENTLY REPORTED IN ITS 2012 GLOBAL INFORMATION SECURITY SURVEY THAT CIOS ARE LEERY ABOUT THE SECURITY OF CLOUD COMPUTING SYSTEMS. IN OTHER NEWS, WATER IS WET, THE SKY IS BLUE AND SIBLINGS FIGHT. Trepidation over cyber security cloud computing issues is not…
-
6 Key Ways to Fight the Identity and Access Management Battle Royale
IAM first line of defense. The Marine Corps motto, “Semper Fidelis” — Always Faithful — has always been revered by those who have served in “The Corps” as a pledge of brotherhood to one another. Whether in battle or in peace time, Marines have honored this sworn bond to stand united. But even this sworn…
-
IAM what IAM… But that’s Not All Identity and Access Management Is
Identity and access management crush. An interesting discussion came up recently on the Gartner Identity & Access Management XChange on LinkedIn. A participant asked for a breakdown of the elements that make up Identity and Access Management (IAM). A number of opinions were offered, most differing only slightly from the others. Perhaps the most different…
-
Top 7 Tips to Nick Identity Management Hacking in the Bud
Identity management hacks an invasive species. We were reminded last week that the bigger the organization the more prone it is to be at risk as a target for infiltrating its security. The latest reminder came in the form of a claim from the hacking group AntiSec. This affiliate of the "Anonymous" hacking collective, which…
-
The Top Five Mistakes in Defining Identity Management Roles
Identity management bloopers on the rise. One of the most critical parts of implementing your Identity and Access Management System is to define roles correctly. An identity management system with a poorly designed role structure is like owning a Ferrari, but running it on space-saver spare tires. Therefore, avoid these 5 common mistakes when embarking on identity…
-
Cyber Security Solutions Begins with You
President Obama’s cyber call to action. In case you missed it, President Obama wrote an extraordinary editorial that appeared in last Friday’s Wall Street Journal, focusing on cyber security threats on America’s infrastructure. The article begins by describing a simulation of multiple cyber security threats focused on deploying malware on critical systems that operate transportation,…
-
Avatier on Display at Gartner Identity and Access Management
The identity and access management innovation leader. In the iconic film, “Wall Street”, multi-billionaire Gordon Gekko reveals that, “The most valuable commodity I know of, is information”. If information is the most valuable commodity in business then the most important challenge facing an organization is identity and access management — the management of how information…
-
Quest Identity Management Acquisition Could Be Good For Some
Quest identity management prospects. With the recent rumors hitting the web suggesting that several large companies including Dell, Microsoft, Oracle, CA and BMC are interested in buying Quest Software, it shows that acquisitions continue to be the easiest way for massive organizations to expand their offerings. Unfortunately, this trend has proven over and over again to…
-
Weaving The Trusted Identity Fabric at the Gartner Identity and Access Management Summit
Gartner Identity and Access Management Summit. Several months ago, we sponsored the Gartner Identity and Access Management Summit in San Diego, California and had an opportunity to see, first-hand, a host of new IAM solutions focused on helping IT managers be more productive. Unfortunately, the reality is that all the identity and access management solutions…
-
Deconstructing Identity Management Innovation
This blog is dedicated to the innovator in everyone. No one ever starts a company, leads a department or runs an IT organization to embrace the status quo. But do you ever wonder how Steve Jobs became the world’s most recognized and prolific innovator of the 21st century? What secret intellectual sauce, innovation did he…