Archives
-
IAM Best Practices Blog Series: Access Governance Not Working Well? Here’s How to Fix It
One of the biggest impediments to effective identity governance begins at the planning stage with determining who owns the identity function in the business. In an Identity Defined Security Alliance (IDSA) survey of non-IT stakeholders who play a part in the identity workflow and security considerations, it was discovered that many departments within a business owned a…
-
A Single Identity Management and Security Strategy for Hybrid Clouds
Hybrid IT environments are becoming the exception and not the rule. Cloud adoption has transformed more than business operations; it has also transformed how businesses need to address identity management and security. Today’s identity teams and cloud architecture specialists are facing a myriad of challenges. In my new paper—“Multi-Cloud Access Management Done Well – Myth…