Ensure success with identity and access management
Your initial IDAM solution specs should include detailed current and probable future functionality requirements, says Wayne Olsen, security business unit manager at Datacentrix.
Seven tenets of successful IAM
A company's identities dictate who accesses its applications and data, as well as what can be done with that access, says Darran Rolls, CTO at SailPoint.
Prevent fraud, comply with POPI
The need for identity and access management to secure data is a vital aspect of any comprehensive organisational security plan, says Jaroslav Cerny, CEO of RDB Consulting.
Great walls, lousy controls
Contractors and privileged users roam much more freely in companies' IT infrastructures than most will admit.
Wake-up call on the way
Identity and access management adoption shouldn't be pushed by law, but rather by the pain of loss.
Who goes there?
Tough economic times result in more insider threats, which means identity and access management needs to be on everyone's agenda.
Reaping the real benefits of IAM
The complexity of IAM software requires planning to ensure benefits filter through the entire business, says Karel Rode, principal consultant, CA.
Further down the rabbit hole
Regulation coming into effect internationally will drive the adoption of IAM, but will make data management more complex locally.
User provisioning goes backwards
Regulatory compliance continues to be a key driver of IAM implementations, but user provisioning has taken a step back.
Getting started with ID, access management
Identity and access management projects are a priority for many organisations, but where do they begin? Grenville Payne, consultant at Unisys Africa, has the answer.