Year: 2011

Getting Your IAM Program Ready for 2012

It’s that time of year, when everyone does their best Carnac the Magnificent impression and rolls out their prognostications and top 10 lists. Here at Identropy, we’re not so sure about trying to predict the future, but we do know a thing or two about helping customers succeed in meeting the goals of their IAM

Protecting Yourself While Using Cloud Services

I was recently asked to comment on the top 5 ways to protect yourself (as an individual) when using the cloud. Obviously I brought a very identity-centric slant to it, but it was an interesting exercise as I tried to put down on paper (!) the steps I take to protect myself daily. I thought

Mission Accomplished? Not Quite…

To all those claiming victory in the nymwars, hold on to your horses and read between the lines. Nothing that has been said indicates any kind of understanding from Google on the debate over use of pseudonyms. Phrases like “the issue is technology, resources and the atmosphere the company wanted to set” sounds suspiciously like

Join Quest and Identropy for an IAM Lunch and Learn

[Cross posted from the Identropy blog here] Want to get a deep dive on how to achieve success with your identity and access management program? Then join us for a lunch and learn where Quest Software and Identropy will share insight on the key technologies and best practices that can help you improve your security

Google+ and The Trouble With Tribbles

In a prior post I talked about the backlash against the “Real Names” policy that Google has instituted for it’s Google+ social network. The resulting nymwars are in full force, and drew me into a very interesting twitter back-and-forth between Kevin Marks, myself and Tim O’Reilly over the weekend, which Kaliya (or IdentityWoman, as she

When Will We Stop Taping Up Our Windows?

It was an interesting weekend, to say the least. I’ve never had to prepare for a hurricane before, so going through the exercise was a revelation in so many ways. You discover what you consider really “valuable” (like when I actually packed my external hard drive that has 10 years worth of digital images and

What’s In A Name? A Lot, Actually

The “Real Names” debate has been fascinating to watch, because it such an intriguing melange of issues – social conventions, technical requirements, best practices, community responsibility – rolled into what would on the surface seem to be a very simple problem. After all, what we’re really talking about is what value to let people put

The Purpose Driven IAM Life

[Cross-posted from the Identropy blog, where I will be contributing some posts from now on] Another Catalyst conference (now Gartner Catalyst) has come to an end with the former Burton Group analysts challenging us once more to do better as an industry. It’s an unfortunate reality that cost overruns, unrealized benefits and missed objectives still

And Now For Something Completely Different

At the Cloud Identity Summit last week, one thing was patently obvious – the agenda was filled with super interesting talks from very talented speakers. So given that I was talking about the riveting (not!) topic of user provisioning, I knew I had to pique peoples curiosity to draw them in. To that end, I

From The End Spring New Beginnings

As I posted on Friday, I decided it was time to close the chapter on my career at Thoracle (by the way, the positive wishes in response from all of you has been quite gratifying). But it wasn’t without knowing what the next chapter was going to bring. It’s going to be a busy July