Archive For September, 2012
Pop the corks! It has been my experience most successful cyber security measures and platforms are those run "in the background"; applications so seamlessly integrated into the overall system the…read more →
Bank on access governance software. When it comes to identity and access governance software, businesses need to take a cue from President John F. Kennedy’s first inaugural address. In one…read more →
Don’t do it. Does everyone remember when Full Service gas stations were the norm, and Self Service was rare? Would you prefer to go back to Full Service filling stations, or…read more →
Identity and access management crush. An interesting discussion came up recently on the Gartner Identity & Access Management XChange on LinkedIn. A participant asked for a breakdown of the elements…read more →
Identity management hacks an invasive species. We were reminded last week that the bigger the organization the more prone it is to be at risk as a target for infiltrating…read more →
Access management software growth. It’s time for the IT and Information Security industries to start thinking in broader business terms when it comes to identity and access management software. “Identities” in…read more →
Identity management SaaS is no joke. When it comes to growth in IT systems, we usually think problems like identity management security and enterprise risk management compliance increase with technology…read more →