The Identropy Blog

What the Olympics and an IAM Program Have in Common

Posted by Jaime Lewis-Gross on Aug 19, 2016 9:00:00 AM

What comes to mind when I picture an Olympic athlete?

  • Commitment
  • Conditioning
  • Repetition

An Olympian is committed to their specialty, continually conditioning their mind and body to optimize performance, and repeating their actions again and again to achieve as close to perfection as possible.

I liken this with preparing for an IAM implementation.

Read More

Topics: IAM Program

Simplifying IAM Planning

Posted by Luis Almeida on Aug 12, 2016 10:46:39 AM

During the early days of the Age of Exploration, it took European navigators 10 years to get past Cape Bojador in Africa.

Once they got past it, they must have all wondered why they struggled with it in the first place.

Historians blame the delay on winds, currents and legends of sea monsters.

Although conditions posed some challenge there really was no excuse for how long it took explorers to round this small cape in Northern Africa. 

When they did get past it they quickly made it to the next major geographical and psychological obstacle on the path to riches: the Cape of Good Hope.

It seems to us at Identropy that the current state of IAM is analogous to when Gil Eanes finally got around Bojador in 1434. In our view, we have rounded Bojador and there is absolutely no reason why IAM implementations should be something to fear.

Read More

Topics: IAM Program Management

[Webinar] Securing Access in a Digital Healthcare World

Posted by Identropy on Aug 10, 2016 12:23:40 PM

SailPoint and Identropy are teaming up to deliver a webinar about securing access in a digital healthcare world. 

One of our clients, Dartmouth-Hitchcock, will be presenting on challenges they faced with securing access within the organization.

Join us for this co-sponsored webinar on Thursday, August 18th at 10:00AM CT / 11:00AM ET. 

Read More

Topics: electronic healthcare

Strong Authentication: Why Iris Scanning Isn't Just for Bond Films Anymore

Posted by Jeff Steadman on Aug 5, 2016 10:05:46 AM

Anyone that knows me well is aware of my fondness for mobile technology. Basically, if it has a battery and a screen of any size, I am in.

I am also a fan of security that improves upon user experiences and IAM is one of those enablers when done right.

Read More

Topics: strong authentication

The Benefits of an Unstructured Data Governance Assessment

Posted by Luis Almeida on Jul 27, 2016 10:00:00 AM

Every time I look at my calendar and I see that a dentist appointment is coming up I tend to worry that she might find something that is going to lead me towards some type of painful procedure.

I worry and fret and then go to the doctor, and, on the rare occasions that she has told me that she’s going to have to bust out the jackhammer, I’m somewhat relieved.


Read More

Topics: access governance

Is a Cloud-Based IAM Solution Right For Me?

Posted by Luis Almeida on Jul 19, 2016 11:30:00 AM

The convergence of the IDaaS and IAM spaces is creating a lot of confusion for many of our clients.

This has a lot to do with the marketing efforts of software vendors, but it also has to do with internal confusion around the definition of identity management, business objectives around identities and strategic goals like taking one’s IT infrastructure to the cloud.

I’m going to take a stab at trying to help us think this through–and I think the best approach to determining whether the cloud is a right fit is to first understand our objectives and use cases.

Read More

Topics: Cloud Identity

IAM Implementations: Common Strokes for Different Folks

Posted by Luis Almeida on Jul 15, 2016 11:00:00 AM

I’ve always heard that no two snowflakes are exactly alike. I don’t know if this is true, but I’m willing to accept it as a fact.

No two clients are identical; they all have different IAM needs, target systems, processes and procedures.

No two IAM implementations will ever be alike, but if we consider this situation with an open mind we will see that in the early stages of an IAM implementation many are really quite similar.

Read More

Topics: IAM

Pokemon Go: The Problem With Success

Posted by Fletcher Edington on Jul 13, 2016 11:30:00 AM

Pokemon Go has taken the world by storm. 

There are currently more Pokemon Go users than Twitter users in America. Pokemon Go has been out in the U.S. for 7 days.

Let that sink in for a second. It took 7 days for an application to have more users than Twitter in America. 

As big an event as it is, the launch has been troubled by numerous issues. Two of the most prominent are:

Read More

Topics: IAM

IAM Platform Integrations: Innovation or Just Glue?

Posted by Ash Motiwala on Jul 6, 2016 10:30:00 AM

Since its inception, Identropy has had a love affair with innovation.

We’ve always encouraged Identropians to challenge why things are done in a specific way, and to tinker with new tech to find smart ways to tackle hard problems.

That has served us well, and has resulted in many successes (and many failures as well!) in the IAM field,
including the development of the industry's first Managed IAM Platform, and SCUID, the Identity-as-a-Service platform that CA acquired from us in 2014.

Read More

Topics: IAM

Risk Mitigation: The Proof is in the IAM Consulting Services Partner

Posted by Luis Almeida on Jun 28, 2016 2:00:00 PM

In the last few weeks I encountered twice a situation that is very telling about our space. We were assisting two of our clients with their vendor selection process. They were in final contract negotiations when the issue around software warranties came up.

Their selected vendor offered a 30 day money back guarantee.

The challenge these two clients saw with this warranty is that it would impossible for us to deploy anything meaningful in 30 days so it would be impossible for them know if the product worked or did not work.

Read More

Topics: IAM Consulting

Subscribe by Email