Digital identity’s center of gravity has shifted to customer-facing identity (CIAM). As we learned in the changing face of identity (part 1 of this post), effective CIAM is crucial.
Ian Glazer, who inspired my last two posts… Continue reading
Digital identity is the core of the digital transformation. It underpins sales and distribution, enables outreach to customer communities, and helps build business value chains. But organizations must traverse a minefield of threats, operational challenges, and compliance issues. As we… Continue reading
Security Architects Partners will be speaking at the third Columbus IAM User Group meeting!
This is a free meeting of local IAM Professionals with drinks and appetizers provided. Networking, best practices and an open exchange of ideas between IAM professionals… Continue reading
Data protection requires effectively coordinating good practices across many security domains. It is actually a large subset of the overall security program. Take a look:
If you’re familiar with Security Architects Partners, you’ll know we’re both broad and deep in… Continue reading
We recently completed a consulting engagement to create an authorization framework for a large financial services organization. As illustrated, the framework has three dimensions: Runtime authorization patterns, policy models, and governance structures.
The “runtime authorization patterns” describe the components, interfaces,… Continue reading
We are now in the second golden age of identity and access management (IAM). Mobile devices, cloud computing, social networks, Big Data, and the Internet of Things (IoT) require radically improved capabilities. They are driving rapid innovation in IAM standards,… Continue reading
I’ll be headed back to the Big Apple – the city of my birth where it all began – to the ForgeRock Identity Summit: Building Digital Trust with Digital Identity.
It will be great to be in the… Continue reading
Looking forward to an action packed KuppingerCole European Identity Conference, or EIC.
Participating on the Analyst Panel “Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM”: It will great to revisit this topic,… Continue reading
The Cloud Access Security Broker (CASB) is an architectural concept become an over-sized security market category. Many of the pieces in the CASB model are necessary for coherent cloud security policy enforcement. But is a unified CASB solution as presently… Continue reading