Blog

Back-of-the-cocktail-napkin math

Our team recently attended Gartner's Identity and Access Management conference in Las Vegas, Nevada, and we had the pleasure of meeting many first-time attendees who had not yet deployed a Privileged Access Management (PAM) program ...
Read More

Four Critical Cybersecurity Predictions for 2018

Our team recently attended the Gartner Identity and Access Management conference in Las Vegas, Nevada to help shape the future of cybersecurity for 2018. Over 1,600 attendees came to learn about what’s next for cybersecurity ...
Read More

2018 Prediction: The IDaaS market matures without a clear leader

The market is ready for an Identity-as-a-service leader – but you wouldn’t know it from the conference topics. This year’s Gartner IAM Summit has the usual mix of beginner introduction sessions and advanced forward-looking material ...
Read More

IGA Adoption Practices and Challenges: Part 4 – Tool Configuration

Moving beyond organizational alignment and operational support, optimizing an IGA solution requires technical collaboration and coordination. Configuring the tool properly relies heavily upon proper stakeholder management, full requirements-gathering, and testing prior to going live.  Missing ...
Read More

IGA Adoption Practices and Challenges: Part 3 – Operational Support

Once deployed, IGA platforms require ongoing “care and feeding” to stay current and operational. This is another challenge often underestimated in IGA planning. Here are specifics for generating ongoing value out of an IGA investment ...
Read More

Ready to talk IT Security with us?

Contact Us