Identity and Access Intelligence
Way back in September 2009 (it seems like an eternity in Identity years), I made a prediction that data analytics would begin to play a larger role in the Identity and Access Management market:...
View ArticleSimplicity, Complexity and Identity Management
I have been concerned for some time that Information Technology systems in general and Identity Management systems in general have become so complex that it takes rocket scientists to understand them,...
View ArticleAberdeen Research Brief: Identity and Access Management – Platform vs. Point...
One of the big questions in modern Identity and Access Management continues to be: “Is it better to choose individual point solutions and integrate them in my enterprise, or should I choose a complete...
View ArticleIAM – Fundamental Enabler for New Business Models
During the past three weeks, I have interacted with three major customers, in industries as diverse as transportation, apparel and entertainment, that had one thing clearly in common – each saw...
View ArticleTweet Chat: #mobileidm
Please join me and other interested identerati on a live Tweet Chat about Mobile Identity Management trends and security challenges. Amit Jasuja, Senior Vice President, Development - Identity...
View ArticleIdentity and Access Management – Capability Model
In a recent twitter conversation with Andre Koot, he suggested that we needed innovation in both Identity Management and Access Management. He referred me to his blog, entitled “Let’s Kill the IAM...
View ArticleKuppingerCole: Information Security Predictions and Recommendations 2014
Kuppinger Cole just released an insightful Advisory Note: “Information Security Predictions and Recommendations 2014.” The introduction stated: Information Security is in constant flux. With the...
View Article
More Pages to Explore .....