In 2012 Randall Gamby wrote an interesting article on the relationship between identity management and compliance. He stated that identity and access management (IAM) systems could be broken down into two activity areas: predetermined and real-time access control. He went …
Read MoreWe participated in the 8th annual Gartner Identity & Access Management Summit (Nov 18 – 20, 2013) at Los Angeles. We were also a Silver Sponsor and are excited to gain validation on our offerings and more importantly for being …
Read MoreHave you ever walked into a store to buy something very specific but ended buying a lot more than you actually use or wanted? If you answered yes, chances are that you did not have a choice as what you …
Read MoreSo you thought IAG was meant only for large companies that have thousands of employees and hundreds of applications? And IAG should primarily be used for mandated compliance? Not really….at the heart of governance is very simple principle – ensuring …
Read MoreIrrespective of what business someone does, it is not easy to figure out the boundaries of access in an Organization. Be it undesired empowerment with excess access or being unable to perform one’s job function because of under access, the …
Read More