What happens when you take a bunch of technologists interested in identity, cloud computing, mobile and the evolution of IT and whisk them away to a resort in wine country? Well, we will get a chance to find out next week at the Cloud Identity Summit that is taking place in Napa, CA. Through workshops,
As this Joy of Tech cartoon demonstrates, PRISM seems to have solved that problem for us. All that’s left to do is slap a RESTful Web Service on that data source. Should it be SAML or SCIM? This is pretty much the epitome of “It’s funny because it’s true”. The way that “metadata” can be
If you’ve been following Authentication related discussions, you know that a lot of the tactical focus is on adding additional authentication factors to the base username/password login mechanism as a way of making it more secure. This is particularly true in consumer facing applications, as brought into stark contrast by the Mat Honan hack episode.
Another year, and another Catalyst conference had come and gone. This one was very different. For one, the structure of the conference is very different from years past, focusing on thematic areas rather than topics of research. As such, there was no focused identity track, but rather a sprinkling of identity management topics throughout the
Anyone following me on Twitter is well aware of my stance on AddressBookGate. While the tech world’s initial outrage was being directed at Path, I felt that a more balanced conversation would also lay some culpability at the feet of Apple and other API platforms that were exposing data to applications like Path without any
RWW Enterprise just covered the latest update of PingFederate in an article titled It’s PingFederate 6.6 Versus “Identity as a Service”. I couldn’t pass up the opportunity to comment on some details that made me cringe, so naturally this blog post was born. Please note that this is not about PingFederate in specific, a product
It’s that time of year, when everyone does their best Carnac the Magnificent impression and rolls out their prognostications and top 10 lists. Here at Identropy, we’re not so sure about trying to predict the future, but we do know a thing or two about helping customers succeed in meeting the goals of their IAM
[Cross posted from the Identropy blog here] Want to get a deep dive on how to achieve success with your identity and access management program? Then join us for a lunch and learn where Quest Software and Identropy will share insight on the key technologies and best practices that can help you improve your security
It was an interesting weekend, to say the least. I’ve never had to prepare for a hurricane before, so going through the exercise was a revelation in so many ways. You discover what you consider really “valuable” (like when I actually packed my external hard drive that has 10 years worth of digital images and
[Cross-posted from the Identropy blog, where I will be contributing some posts from now on] Another Catalyst conference (now Gartner Catalyst) has come to an end with the former Burton Group analysts challenging us once more to do better as an industry. It’s an unfortunate reality that cost overruns, unrealized benefits and missed objectives still