Live Webcast: Reduce your IDM Operating Costs Using IDaaS

Time and time again, we hear from organizations that are struggling with the task of managing their IAM deployments. Budget overruns and unexpected expenses, the difficulty of finding and retaining IAM specialists, the inability of an overtaxed IT department to keep up with the constant adjustments and demands on the program – these are just

Getting Your IAM Program Ready for 2012

It’s that time of year, when everyone does their best Carnac the Magnificent impression and rolls out their prognostications and top 10 lists. Here at Identropy, we’re not so sure about trying to predict the future, but we do know a thing or two about helping customers succeed in meeting the goals of their IAM

Protecting Yourself While Using Cloud Services

I was recently asked to comment on the top 5 ways to protect yourself (as an individual) when using the cloud. Obviously I brought a very identity-centric slant to it, but it was an interesting exercise as I tried to put down on paper (!) the steps I take to protect myself daily. I thought

Mission Accomplished? Not Quite…

To all those claiming victory in the nymwars, hold on to your horses and read between the lines. Nothing that has been said indicates any kind of understanding from Google on the debate over use of pseudonyms. Phrases like “the issue is technology, resources and the atmosphere the company wanted to set” sounds suspiciously like

Join Quest and Identropy for an IAM Lunch and Learn

[Cross posted from the Identropy blog here] Want to get a deep dive on how to achieve success with your identity and access management program? Then join us for a lunch and learn where Quest Software and Identropy will share insight on the key technologies and best practices that can help you improve your security

Google+ and The Trouble With Tribbles

In a prior post I talked about the backlash against the “Real Names” policy that Google has instituted for it’s Google+ social network. The resulting nymwars are in full force, and drew me into a very interesting twitter back-and-forth between Kevin Marks, myself and Tim O’Reilly over the weekend, which Kaliya (or IdentityWoman, as she

When Will We Stop Taping Up Our Windows?

It was an interesting weekend, to say the least. I’ve never had to prepare for a hurricane before, so going through the exercise was a revelation in so many ways. You discover what you consider really “valuable” (like when I actually packed my external hard drive that has 10 years worth of digital images and

What’s In A Name? A Lot, Actually

The “Real Names” debate has been fascinating to watch, because it such an intriguing melange of issues – social conventions, technical requirements, best practices, community responsibility – rolled into what would on the surface seem to be a very simple problem. After all, what we’re really talking about is what value to let people put

The Purpose Driven IAM Life

[Cross-posted from the Identropy blog, where I will be contributing some posts from now on] Another Catalyst conference (now Gartner Catalyst) has come to an end with the former Burton Group analysts challenging us once more to do better as an industry. It’s an unfortunate reality that cost overruns, unrealized benefits and missed objectives still

And Now For Something Completely Different

At the Cloud Identity Summit last week, one thing was patently obvious – the agenda was filled with super interesting talks from very talented speakers. So given that I was talking about the riveting (not!) topic of user provisioning, I knew I had to pique peoples curiosity to draw them in. To that end, I