The Identropy Blog

Building an IAM Program is Like Building a Deck

Posted by Jim McDonald on Feb 9, 2016 8:00:00 AM

Over the holidays, I decided to rebuild my deck. It's now February, and I am still not finished.

I’ve had a lot of time to think about how deck building is a lot like building an IAM program (deep stuff huh?).

I figured I'd share these deep thoughts in hopes you can avoid some of the common pitfalls of an IAM program.

Read More

Topics: IAM Program

Don't Mess up Your IAM Service Launch!

Posted by Jeff Steadman on Feb 4, 2016 11:07:02 AM

Launching a new Identity & Access Management (IAM) service is hard. A key component to a successful roll-out is your IAM program's ability to effectively communicate, coordinate, and execute the plan you have developed.

When it comes to launching a new IAM service, the last thing you need on launch day is confusion.

You have spent weeks and maybe even months preparing for this moment of truth where a facet of the IAM program’s goals is about to be realized. Don’t mess up by failing to ensure you IAM team, support teams, and customers are all on the same page!

Read More

Topics: IAM

Choosing the Right Identity Management Solution in 100 Words

Posted by Identropy on Feb 2, 2016 3:00:00 PM

Identity & access management (IAM) is continuing to set new precedents in enterprise security.

In the past we have seen countless breaches and hacks that have left many companies defenseless and vulnerable.

Read More

Topics: Identity Management

These are the Biggest Challenges for CISOs in 2016

Posted by Jeff Steadman on Jan 28, 2016 10:30:00 AM

Security Current recently polled 25 CISOs to discuss what they saw as their biggest challenges for 2016.

Most are concerned about the continued migration to using more cloud apps and continue to not only worry about getting breached, but how quickly they can respond to mitigate damage when (not if) they get breached.

As a result, CISOs are assuming the worst and developing their plans accordingly. 

Read More

Topics: IAM

Do Not Share This Information With Anybody

Posted by Jim McDonald on Jan 26, 2016 8:00:00 AM

What could we be talking about with a headline as salacious as that? The answer of course is P@$$w0rds!

I think it is always a healthy exercise to go back to the basics. I wanted to review some of the best practices for password management. 

Consider queuing up a communication to your user base on best practices for selecting and managing their passwords.

Read More

Topics: passwords

[New Guide] How to Implement an Effective Identity Management Strategy

Posted by Identropy on Jan 21, 2016 8:00:00 AM

The proliferation of IoT devices has fueled the technological age we live in, but it's been at the expense of many corporate enterprise's data and sensitive information. With large-scale companies being breached almost daily, can you afford to be without the right IAM solutions? 

It's important to pump the brakes on scalability to see how to effectively run an identity management solution that ensures security and proper role assignment. This will also propel a framework set up for success for the present and future endeavors of your enterprise. 

Read More

Topics: Identity Management

Bad IAM Practices Led to the Death Star's Destruction

Posted by Jeff Steadman on Jan 12, 2016 10:00:00 AM

Spoiler alert - If you are one of the few people left on the planet that has not seen 1983's Star Wars: Episode VI - Return of the Jedi, major plot line spoilers below. 

Still with me? Great! Let's continue…

Read More

Topics: IAM

The IAM Sequence Diagram

Posted by Jim McDonald on Jan 8, 2016 1:30:00 PM

Planning an Identity Access Management (IAM) deployment can be tricky - in large part because of the interactions between applications, platforms, and the IAM system.

One of the tools we use to plan our IAM initiatives is the IAM sequence diagram. The sequence diagram captures the steps in a workflow and indicates which systems are responsible for each action. This can be super valuable when it comes to communicating what system will be responsible for what.

Read More

Topics: IAM strategy

What to Expect for Identity and Access Governance in 2016

Posted by Identropy on Jan 5, 2016 10:24:33 AM

As both enthusiasts and advocates for identity and access management and access governance, we see big changes coming this year.

To briefly reflect on 2015, it was full of development and reevaluating what compromises must be made to acquire a fully functional and secure enterprise.

For some, it meant outside help; for others, finally admitting that IT is only a fraction of what’s needed to secure current-day processes and data.

Either way, we still have our work ahead of us.

Read More

Topics: identity and access management

Gartner IAM Summit Insights from the Identropy Team!

Posted by Identropy on Dec 22, 2015 8:00:00 AM

Last week Identropy attended the Gartner Identity & Access Management (IAM) summit in Las Vegas, Nevada. This is one of the biggest IAM-specific conferences of the year and theme was all about bringing out the value of IAM.

Read More

Topics: GartnerIAM, Gartner IAM Summit

Subscribe by Email

10_Important_Questions_to_ask_Your_IAM_Solutions_Provider_Sidebar