The Identropy Blog

Is a Cloud-Based IAM Solution Right For Me?

Posted by Luis Almeida on Jul 19, 2016 11:30:00 AM

The convergence of the IDaaS and IAM spaces is creating a lot of confusion for many of our clients.

This has a lot to do with the marketing efforts of software vendors, but it also has to do with internal confusion around the definition of identity management, business objectives around identities and strategic goals like taking one’s IT infrastructure to the cloud.

I’m going to take a stab at trying to help us think this through–and I think the best approach to determining whether the cloud is a right fit is to first understand our objectives and use cases.

Read More

Topics: Cloud Identity

IAM Implementations: Common Strokes for Different Folks

Posted by Luis Almeida on Jul 15, 2016 11:00:00 AM

I’ve always heard that no two snowflakes are exactly alike. I don’t know if this is true, but I’m willing to accept it as a fact.

No two clients are identical; they all have different IAM needs, target systems, processes and procedures.

No two IAM implementations will ever be alike, but if we consider this situation with an open mind we will see that in the early stages of an IAM implementation many are really quite similar.

Read More

Topics: IAM

Pokemon Go: The Problem With Success

Posted by Fletcher Edington on Jul 13, 2016 11:30:00 AM

Pokemon Go has taken the world by storm. 

There are currently more Pokemon Go users than Twitter users in America. Pokemon Go has been out in the U.S. for 7 days.

Let that sink in for a second. It took 7 days for an application to have more users than Twitter in America. 

As big an event as it is, the launch has been troubled by numerous issues. Two of the most prominent are:

Read More

Topics: IAM

IAM Platform Integrations: Innovation or Just Glue?

Posted by Ash Motiwala on Jul 6, 2016 10:30:00 AM

Since its inception, Identropy has had a love affair with innovation.

We’ve always encouraged Identropians to challenge why things are done in a specific way, and to tinker with new tech to find smart ways to tackle hard problems.

That has served us well, and has resulted in many successes (and many failures as well!) in the IAM field,
including the development of the industry's first Managed IAM Platform, and SCUID, the Identity-as-a-Service platform that CA acquired from us in 2014.

Read More

Topics: IAM

Risk Mitigation: The Proof is in the IAM Consulting Services Partner

Posted by Luis Almeida on Jun 28, 2016 2:00:00 PM

In the last few weeks I encountered twice a situation that is very telling about our space. We were assisting two of our clients with their vendor selection process. They were in final contract negotiations when the issue around software warranties came up.

Their selected vendor offered a 30 day money back guarantee.

The challenge these two clients saw with this warranty is that it would impossible for us to deploy anything meaningful in 30 days so it would be impossible for them know if the product worked or did not work.

Read More

Topics: IAM Consulting

Cloud Identity Summit 2016 Takeaways

Posted by Jeff Steadman on Jun 14, 2016 8:00:00 AM

I attended the Cloud Identity Summit in New Orleans this week. This was my first trip to this particular conference and it was a well-run event with a lot of great topics and speakers.

Here are some of the key takeaways from the multitude of sessions I attended:

Read More

Topics: Cloud Identity Summit

[Newsjack] Context is Key to Identity and Access Management

Posted by Identropy on Jun 7, 2016 8:00:00 AM

It’s been shown that the security baseline of yesteryear is far from sufficient; in fact, even the binary identity and access management (IAM) approach fails to provide the proper level of security to protect important data.

Read More

Topics: IAM

Getting the Keys to the Kingdom With IAM Governance

Posted by Identropy on Jun 1, 2016 9:59:18 AM

Earning the “keys to the kingdom” can be as elusive as getting the pot of gold at the end of the rainbow. But what does it actually mean?

To understand the importance of getting these keys, we need to dig a little deeper into identity governance, or an identity and access management (IAM) governance body.

Explaining identity governance is easy: it’s a way of having ultimate access to who is doing what, when, and why. We’ll get more into this later.

Read More

Topics: access governance

Why Identity Management Consulting Matters in 100 Words

Posted by Identropy on May 17, 2016 8:00:00 AM

We all try to do as much as we can on our own, but sometimes, help is needed to get the job done the right way, in the right amount of time. This is why a consultant can be a valuable asset for your identity management enterprise efforts and other initiatives.

Read More

Topics: Identity Management

What Companies are Most Vulnerable to Hacker Attacks?

Posted by Identropy on May 10, 2016 8:00:00 AM

When you think of companies being hacked, which are some of the first that come to mind that are most vulnerable to hacker attacks?

We may be quick to point the finger at big corporations, but it’s not just them that are being targeted--small companies are just as viable to hackers, or “the bad guys.”

This should come as no surprise.

Last year’s Duke University/CFO Magazine Global Business Outlook Survey, indicated that over 80% of U.S. companies’ systems “have been successfully hacked in an attempt to steal, change or make public important data.”

Read More

Topics: IAM

Subscribe by Email