Quantcast
Channel: Discovering Identity » IAM
Browsing all 7 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Identity and Access Intelligence

Way back in September 2009 (it seems like an eternity in Identity years), I made a prediction that data analytics would begin to play a larger role in the Identity and Access Management market:...

View Article



Image may be NSFW.
Clik here to view.

Simplicity, Complexity and Identity Management

I have been concerned for some time that Information Technology systems in general and Identity Management systems in general have become so complex that it takes rocket scientists to understand them,...

View Article

Image may be NSFW.
Clik here to view.

Aberdeen Research Brief: Identity and Access Management – Platform vs. Point...

One of the big questions in modern Identity and Access Management continues to be: “Is it better to choose individual point solutions and integrate them in my enterprise, or should I choose a complete...

View Article

Image may be NSFW.
Clik here to view.

IAM – Fundamental Enabler for New Business Models

During the past three weeks, I have interacted with three major customers, in industries as diverse as transportation, apparel and entertainment, that had one thing clearly in common – each saw...

View Article

Image may be NSFW.
Clik here to view.

Tweet Chat: #mobileidm

Please join me and other interested identerati on a live Tweet Chat  about Mobile Identity Management trends and security challenges. Amit Jasuja, Senior Vice President, Development - Identity...

View Article


Image may be NSFW.
Clik here to view.

Identity and Access Management – Capability Model

In a recent twitter conversation with Andre Koot, he suggested that we needed innovation in both Identity Management and Access Management.  He referred me to his blog, entitled “Let’s Kill the IAM...

View Article

Image may be NSFW.
Clik here to view.

KuppingerCole: Information Security Predictions and Recommendations 2014

Kuppinger Cole just released an insightful Advisory Note: “Information Security Predictions and Recommendations 2014.”  The introduction stated: Information Security is in constant flux. With the...

View Article
Browsing all 7 articles
Browse latest View live




Latest Images