It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that…
Browsing CategoryIdentity and Access Governance (IAG)
Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage
Some online experiences are so bad that 25% of users abandon an application after first use and never return. To avoid this retention problem, you should offer better engagement to…
Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints
In many cases, one business unit sets up its own cloud-native identity and access management controls differently from another. One of your customers’ business units may need Red Hat, while…
How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy
Allow me to shed some light on one of the critical organizational aspects of identity and access management (IAM) that we come across often when delivering IAM consulting services to…
Design Your IAM Program With Your Users in Mind
Identity and access management (IAM) should be a seamless part of employees’ day-to-day activities and your organization’s overall security posture. An IAM program controls and administers the access users have…
Intelligent Access Certification Improves Decision-Making Around Compliance, Identity Governance and More
Co-authored by Fabrizio Petriconi. In the ever-expanding digital ecosystem, having secure and efficient access to resources is critical to both using and delivering services. But if you’re a gatekeeper managing…
How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career
There’s no doubt that a cybersecurity breach can blow up a business, but it’s still surprising to hear Shaked Vax, worldwide technical sales leader at IBM Security, compare some aspects…