-
Recent Posts
Recent Comments
Final Wrap Up… on How to Transform Developers in… Salvador on Big data – discussi… Nichole Gladky on Google apps constituency … Jason on Educause 2013 – first… Mike Gay on MS Office 365 for Educati… Archives
Categories
Meta
Monthly Archives: November 2010
The Dark side of IDM
The Dark side of IDM The law of unintended consequences Buying products can bring in issues that are wrapped up in the product itself. then there is the issue of bad configuration that also leads to security issues. Here is … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Best Practices for Authentication
Best Practices for Authentication – Ant Allan *Failure of strong authentication and 2 factor authentication. Strongest is not necessarily the best for you. Need to meet your requirements in an economical way. Not strongest, but strong enough. lots of passwords … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Managing Identity in the Cloud
Managing Identity in the Cloud [I was late to this session as I was in a gartner one on one meeting. So, here are the highlights that I caught at the end.] **Cloud based solutions are out there, but they … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Microsoft and IAM
Microsoft & IAM Neil McDonald [Great session on MS. very helpful.] MIcrosoft’s IAM strategy: They used to have a security and identity and access division. earlier this year that group was disbanded. those techs are scattered now. Microsoft is not … Continue reading
Posted in Gartner IAM 2010, Uncategorized
2 Comments
Online Crime
Online Crime: From Sexual Predators to Financial Predators to Information Predators Chris Hansen, Dateline, NBCNews Interesting Key Note speaker. He spoke a lot about some of the various investigative reporting stories that he has been involved in. He started off … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Emergence of Consumer Information Brokers
Emergence of Consumer Information Brokers Andrew Nash – Sr Director, Identity Services, PayPal Slowly moving from enterprise IDs to User centric IDs. Give user the knowledge of how info is being used, track it, and allow them to turn on/off … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Bridging the IT & Business Divide with Identity Intelligence
Oracle: Bridging the IT & Business Divide with Identity Intelligence Lots of pressure from IT to go into the cloud. half of your stuff is the same old thing that you have been working with, but the rest is out … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Delivering IAM to Enterprise Customers and Partners in a federated environment
Delivering IAM to Enterprise Customers and Partners Avivah Litan [This is potentially going to be an issue with us as we open up to allowing end users to create their own accounts: Anonymous accounts. It will be very important that … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
Creating an Intelligent Identity And Access Framework for the Cloud
Novell – Creating an intelligent identity and access framework for the cloud. Ben Goodman, Chris Leach User Activity monitoring. Security is going from “IP to IP”, to “Bob goes to SAP”. Need to understand identity and relationships for this to … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment
The Future of Information Security is Context- and Identity-Aware
The Future of Information Security is Context- and Identity-Aware Neil McDonald Key Issues 1. why do we have to change? IT world is changing. · externalization and collaboration · mobilizations · consumerization · cloudification of services · industrialization of hackers … Continue reading
Posted in Gartner IAM 2010, Uncategorized
Leave a comment