Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: IDM

Provisioning: Security’s First Step to Measuring Organizational Impact

– Security is often accused, occasionally with merit, of being an obstacle to an organization’s business. While the drumbeat of cyber threats has at least raised the technology risk consciousness of many business managers, security professionals still have the challenge of quantifying how big an…

In the Workshop (pt. 2) – Building an Identity Management Solution

– When last in the workshop to build our own identity management system we laid the groundwork for a solution by identifying and analyzing our organization’s sourcing, staffing and human resources systems.  Now that we know where our subjects originate and what attributes are available for them,…

Visit to the Workshop: A Do It Yourself Identity Management Solution (IdM)

– One constraint to implementing third-party identity management solutions is cost. Once the moneychangers see the quote, particularly alongside the deployment timeline, the project is likely exiled to some corporate gulag of no return. Since you will need to conduct significant analysis,…

Building an Access Review Compliance Framework

– One of the major selling points for IDM vendors is that their tools will simplify your access review process. In my experience and from what I have seen offered by several of the major IDM vendors, the significant investment you would make in IDM technology, you might likely do nothing more than…