Quantcast
Channel: Ian Glazer » Identity and Access Governance
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Thinking about Matt’s Simple Question: Correlating accounts and people

Matt Hamlin, over at Sun, mentioned a conversation we had last week about a topic in identity management which doesn’t usually get a lot of airtime: the correlation of accounts to people.  The...

View Article



CA’s Acquisition of IDFocus

Yesterday CA announced its acquisition of IDFocus,  a small Israeli company.  Among other abilities, IDFocus provides a finer-grained segregation of duty (SoD) analysis engine.  CA has previously...

View Article

Zen Mind, Newb Mind

Being the new-ish addition to the IdPS team is, well, an interesting place to be.  Besides the requisite induction activities (ask me at Catalyst how you pick up the dry cleaning for a team who lives...

View Article

Nailing Down the Definition of “Entitlement Management”

Ian Yip’s take on access management versus entitlement management can be partially summed up with this equation: Entitlement management is simply fine-grained authorisation + XACML I have four...

View Article

Transparent or Translucent?

Last week I was at the recent Department of Homeland Security’s Government 2.0 Privacy and Best Practices conference. Not surprisingly the subject of transparency came up again and again. One thing...

View Article


Performing an entitlement lobotomy on the enterprise

As a part of its data center consolidation efforts, HP is going to be letting going 9000 IT workers. As this Computerworld article points out, although not confirmed, it highly likely that at least...

View Article

Thoughts from IIW East

Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card game. Ever....

View Article

No, really, who has access to what?

In the unceasing wake of the RSA breach, and especially given Art Coviello’s most recent post, I’ve been thinking about what role identity and access governance can play in mitigating post-RSA attacks....

View Article


Our Platform

In case you didn’t notice, it’s an election year here in the States. So having taken over the reins of the IdPS research agenda, I wanted to get a jump on the candidates, and announce the first three...

View Article


How to Provision a Pope in 6 Easy Steps

Having deprovisioned your previous Pope, you thought your work was done. But just as soon as you’ve settled back into you desk chair you see it – white smoke wafting up from the chimney. It’s time to...

View Article

Thinking about Matt’s Simple Question: Correlating accounts and people

Matt Hamlin, over at Sun, mentioned a conversation we had last week about a topic in identity management which doesn’t usually get a lot of airtime: the correlation of accounts to people.  The...

View Article

CA’s Acquisition of IDFocus

Yesterday CA announced its acquisition of IDFocus,  a small Israeli company.  Among other abilities, IDFocus provides a finer-grained segregation of duty (SoD) analysis engine.  CA has previously...

View Article

Zen Mind, Newb Mind

Being the new-ish addition to the IdPS team is, well, an interesting place to be.  Besides the requisite induction activities (ask me at Catalyst how you pick up the dry cleaning for a team who lives...

View Article


Nailing Down the Definition of “Entitlement Management”

Ian Yip’s take on access management versus entitlement management can be partially summed up with this equation: Entitlement management is simply fine-grained authorisation + XACML I have four...

View Article

Transparent or Translucent?

Last week I was at the recent Department of Homeland Security’s Government 2.0 Privacy and Best Practices conference. Not surprisingly the subject of transparency came up again and again. One thing...

View Article


Performing an entitlement lobotomy on the enterprise

As a part of its data center consolidation efforts, HP is going to be letting going 9000 IT workers. As this Computerworld article points out, although not confirmed, it highly likely that at least...

View Article

Thoughts from IIW East

Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card game. Ever....

View Article


No, really, who has access to what?

In the unceasing wake of the RSA breach, and especially given Art Coviello’s most recent post, I’ve been thinking about what role identity and access governance can play in mitigating post-RSA attacks....

View Article

Our Platform

In case you didn’t notice, it’s an election year here in the States. So having taken over the reins of the IdPS research agenda, I wanted to get a jump on the candidates, and announce the first three...

View Article

How to Provision a Pope in 6 Easy Steps

Having deprovisioned your previous Pope, you thought your work was done. But just as soon as you’ve settled back into you desk chair you see it – white smoke wafting up from the chimney. It’s time to...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images