6 Highlights from Gartner IAM Conference 2017

gartner-iam-conference-2017

Gartner hosted the 12th Identity and Access Management (IAM) Summit in Las Vegas last week, which is likely the largest annual gathering of IAM Professionals in the world with more than 1,700 attendees. The conference format is aggressive with two and half days of presentations, roundtables, plenary sessions, and vendor demonstrations. And that is just during the daytime […]

7 Must-Read Identity Management Articles, August 2017

Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles and deliver them to you on Tuesday evenings. Subscribe to our biweekly newsletter here. Here are the top 7 Cybersecurity and Access Management articles from August 2017. Enjoy!   Identity-in-depth and the evolution of defense  via HelpNetSecurity […]

Identity Management Reference Guide: Key Terms and Definitions

Identity and Access Management (IAM) programs define standard controls to ensure endpoint systems are designed, configured, and managed to preserve the confidentiality, integrity, and availability of information. Most of these controls are recognized as good practice and require minimal effort to implement, if the IAM solution is built properly. Our implementations consistently highlight a need […]

Mastering Identity Management: Challenges in Selecting an IAM Solution

Identity Management solutions have evolved dramatically over the last 10 years, with numerous new entrants into the marketplace. The good news is that cost conscious and proprietary-wary companies have several mature and emerging choices available both via the Cloud and Open Source solutions. With these newer options, the question becomes a bit larger than just […]