Is Your Identity Management Solution a Rube Goldberg Machine?


Is your IAM solution a Rube Goldberg Machine? Rube Goldberg was a famous cartoonist known for his illustrations of machines that accomplish a very simple task in a very complicated manner. Like many IT projects, Identity Management is rife with opportunities to over-complicate the solution and formulate extremely complex designs that include all imaginable use […]

Identity Management Reference Guide: Key Terms and Definitions

Identity and Access Management (IAM) programs define standard controls to ensure endpoint systems are designed, configured, and managed to preserve the confidentiality, integrity, and availability of information. Most of these controls are recognized as good practice and require minimal effort to implement, if the IAM solution is built properly. Our implementations consistently highlight a need […]

Mastering Identity Management: A Better Process for Vendor Evaluation

Selecting a vendor for your Identity Management solution can be an overwhelming task. The market is crowded, product functionality covers a wide range of features, and the investment in both money and time is guaranteed to lock in the business for 2-3 years. If the chosen product comes up short in a key area, the […]

Mastering Identity Management: Challenges in Selecting an IAM Solution

Identity Management solutions have evolved dramatically over the last 10 years, with numerous new entrants into the marketplace. The good news is that cost conscious and proprietary-wary companies have several mature and emerging choices available both via the Cloud and Open Source solutions. With these newer options, the question becomes a bit larger than just […]

10 Challenges IAM Governance Teams Help Organizations Overcome

The best Identity Management (IAM) practitioners are businesses that have adopted a formal governance structure with defined processes and practices that deliver value. Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently without compromising security or causing a compliance breach. The big pivot here is that Identity Management […]