The Identropy Blog

Identropy will be Attending the Gartner IAM Summit!

Posted by Identropy on Dec 1, 2015 8:00:00 AM

Identropy is excited to announce we will be attending this year’s Gartner’s Identity & Access Management Summit! As exhibitors, we will be available to help you with any IAM questions and develop a strategy fit for your business’s needs and pain points.

The Gartner IAM Summit is a premier event tailored for IAM leaders, IAM architects and security leaders seeking to “implement an IAM vision and strategy for the digital age.” There will also be keynote speakers from Gartner, including analysts and end user case study speakers.

If you are interested in how to pursue the future of IAM and take advantage of business innovation and “analytics-driven automation,” you won’t want to miss this exclusive event!

Read More

Topics: GartnerIAM

Why Creating Automated User Provisioning Workflows is Important

Posted by Identropy on Nov 25, 2015 8:00:00 AM

Many IT professionals have come to realize user provisioning can be a cumbersome and time-consuming process. Although acknowledged, there’s no detour around it.

As we know, user provisioning is an identity management procedure described as the creation and management of user privileges and access rights.

Read More

Topics: User Provisioning, automation

ForgeRock D.I.Y.:OpenIDM LiveSync - Part 2

Posted by Mario Dusaj on Nov 24, 2015 8:00:00 AM

In this second video of a two-part series, we show you how to employ the LiveSync feature through editing of the configuration files.  You will also find out how the LiveSync configuration and connector configurations tie together to make this strong feature of OpenIDM work.

Read More

Topics: LiveSync

[Video] IAM Time Machine Demo

Posted by Jim McDonald on Nov 20, 2015 8:00:00 AM

Identropy's IAM Time Machine has been garnering a lot of interest. The purpose of this project was to help demostrate the power of the ForgeRock Open Identity Stack for organizations undergoing a Digital Transformation initiaitive. We've expanded our scope to allow this IAM Time Machine to be a starting point for our clients' Digital Transformation intiative.

Read More

ForgeRock D.I.Y.: OpenIDM LiveSync - Part 1

Posted by Sridhar Sripathy on Nov 17, 2015 8:00:00 AM

Using the power of OpenIDM, this video introduces LiveSync which helps you keep different external systems updated with new changes. LiveSync runs based on a change log polling mechanism to offer a lighter weight process for synchronizing changes.

This video is the first of a two-part series demonstrating how LiveSync can be configured and how powerful it is.

Read More

Topics: LiveSync

Fast and Furious 8 Will be an Identity Management Flick

Posted by Jim McDonald on Nov 3, 2015 8:00:00 AM

Well it should be, right? We all know that the real plot will be stopping a super-villain while racing high-powered cars and flashing beach bodies.

But I heard the Wiz Khalifa song “See you again” this weekend and one of the memorable lines rang in my head:

     “How can we not talk about family when family’s all that we got.”

I couldn’t help applying an Identity Management consultant’s spin:

Read More

Topics: Identity Management

Identropy is now a PartnerNet Platinum NetIQ Partner!

Posted by Identropy on Oct 30, 2015 1:00:00 PM

We here at Identropy are excited to announce our status as a PartnerNet Platinum NetIQ Partner!

This could not have been possible without the hard work and dedication from our engineers and members of the sales team, who achieved the certifications and license sales necessary to reach Advanced Certification status with Microfocus/NetIQ.

Read More

Topics: NetIQ

The World of External IAM is Different

Posted by Jim McDonald on Oct 29, 2015 8:00:00 AM

In the world of managing identities, the biggest divide in the universe is whether we are talking about internal or external (customer) identities. Basically, it’s the Democrats and Republicans of the IAM world.

Read More

[New Guide] 10 Important Questions to Ask Your IAM Solutions Provider

Posted by Identropy on Oct 27, 2015 11:00:00 AM

Identity management has become woven in to everything we do: from laptops, corporate servers and the cloud, all requires the necessary identity and access management (IAM) strategies in place to avoid data breaching 101. Unfortunately many enterprises fail to realize what their industries require, and what kind of IAM solutions provider they need to get the job done right.

Read More

Topics: IAM solution

Customer Identity & Access Management (CIAM)

Posted by Jim McDonald on Oct 20, 2015 8:00:00 AM

CIAM (or Customer IAM) is "all the rage" these days. Contrary to popular belief, CIAM is different than EIAM (or Enterprise Identity Management). In this article, I will explain how. 

CIAM is the centerpiece for the Digital Transformation movement. Oftentimes, Digital Transformation describes when an organization takes on a major initiative to modernize its web presence. Digital Transformations are typically characterized by the need to present a person with an experience tailored toward them.

Read More

Subscribe by Email