Monthly Archives: November 2010

The Dark side of IDM

The Dark side of IDM The law of unintended consequences Buying products can bring in issues that are wrapped up in the product itself. then there is the issue of bad configuration that also leads to security issues. Here is … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Best Practices for Authentication

Best Practices for Authentication – Ant Allan *Failure of strong authentication and 2 factor authentication. Strongest is not necessarily the best for you. Need to meet your requirements in an economical way. Not strongest, but strong enough. lots of passwords … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Managing Identity in the Cloud

Managing Identity in the Cloud [I was late to this session as I was in a gartner one on one meeting. So, here are the highlights that I caught at the end.] **Cloud based solutions are out there, but they … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Microsoft and IAM

Microsoft & IAM Neil McDonald [Great session on MS. very helpful.] MIcrosoft’s IAM strategy: They used to have a security and identity and access division. earlier this year that group was disbanded. those techs are scattered now. Microsoft is not … Continue reading

Posted in Gartner IAM 2010, Uncategorized | 2 Comments

Online Crime

Online Crime: From Sexual Predators to Financial Predators to Information Predators Chris Hansen, Dateline, NBCNews Interesting Key Note speaker. He spoke a lot about some of the various investigative reporting stories that he has been involved in. He started off … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Emergence of Consumer Information Brokers

Emergence of Consumer Information Brokers Andrew Nash – Sr Director, Identity Services, PayPal Slowly moving from enterprise IDs to User centric IDs. Give user the knowledge of how info is being used, track it, and allow them to turn on/off … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Bridging the IT & Business Divide with Identity Intelligence

Oracle: Bridging the IT & Business Divide with Identity Intelligence Lots of pressure from IT to go into the cloud. half of your stuff is the same old thing that you have been working with, but the rest is out … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Delivering IAM to Enterprise Customers and Partners in a federated environment

Delivering IAM to Enterprise Customers and Partners Avivah Litan [This is potentially going to be an issue with us as we open up to allowing end users to create their own accounts: Anonymous accounts. It will be very important that … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

Creating an Intelligent Identity And Access Framework for the Cloud

Novell – Creating an intelligent identity and access framework for the cloud. Ben Goodman, Chris Leach User Activity monitoring. Security is going from “IP to IP”, to “Bob goes to SAP”. Need to understand identity and relationships for this to … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment

The Future of Information Security is Context- and Identity-Aware

The Future of Information Security is Context- and Identity-Aware Neil McDonald Key Issues 1. why do we have to change? IT world is changing. · externalization and collaboration · mobilizations · consumerization · cloudification of services · industrialization of hackers … Continue reading

Posted in Gartner IAM 2010, Uncategorized | Leave a comment