IAM

Mon
11
Jan

Expensive mistakes which can be avoided in an IAM implementation

Expensive mistakes which can be avoided in an IAM implementation

From the very beginning of my professional career I have been a part of different IAM initiatives and have seen and been part of all the phases from requirements gathering till the implementation and warranty support. I have had a chance to see very complex and successful implementations at the same time had some not so good experiences. So, I kept on asking myself what actually has gone wrong with those IAM initiatives that they failed eventually and the organisation lost their investment.

So here are the few key points which I found worth looking into.

Tue
05
Jan

How IAM Strategy Will Change With the Introduction of Disruptive Technologies ?

How IAM Strategy Will Change With the Introduction of Disruptive Technologies ?

The pace at which the technology has changed in the past 5 years and the introduction to the disruptive trends has put most of the existing solutions obsolete or very soon to be obsolete. Organizations have lately started taking security and data seriously and Identity and Access Management (IAM) as a technology has got lot of attention because of the efficiency, compliance requirement, cost savings and minimal human intervention. IAM has grown from a good to have feature in the technology landscape to the most sought after requirement. Organizations moved away from home grown IAM solutions to professional vendors and suppliers to implement it.

Thu
09
Jul

Ingredients of Robust Identity and Access Governance

I have been hearing the need of robust Identity and Access Management & Governance from past several years throughout my meetings with IT directors, managers. However, at the same time I feel that it is being represented using a very complex terminologies and is difficult for a business to understand it. Based on my experience, the key ingredients of robust Identity and Access Management & Governance (IAM/G) is an integrated:

1.Identity Management

2.Access Management

3.Segregation of Duties

4.Access Recertification

5.Organizational Change

6.Closed Loop Remediation

Pages

Subscribe to RSS - IAM