[Log In] []

Exploring the science and magic of Identity and Access Management
Friday, November 8, 2024

links for 2009-08-29

General
Author: Mark Dixon
Saturday, August 29, 2009
2:01 am
Comments Off on links for 2009-08-29 . Permalink . Trackback URL
 

links for 2009-08-28

General
Author: Mark Dixon
Friday, August 28, 2009
2:00 am
Comments Off on links for 2009-08-28 . Permalink . Trackback URL
 

Quick Wins in Identity Management – Still Alive and Well

Identity
Author: Mark Dixon
Thursday, August 27, 2009
4:49 pm

I enjoyed reading Felix Gaehtgens’ recent article entitled "Quick Wins in Identity Management."  The essence of his post is summarized in his second paragraph:

With the current squeeze on cost and corporate spending, many IT departments find themselves in a true quagmire. On one hand, the IT industry is focusing on efficiency like never before – elaborating new approaches and processes to increase efficiency and do more with less. Governance and risk management is a big issue whose lack has greatly contributed to the current crisis. IT is under scrutiny to be more of a business enabler and less of a cost center. All of this requires change, new technology, and strategic vision. But as IT spending is reduced or even capped, this creates a Catch 22 situation. Under pressure, some IT departments try for more tactical approaches that can eventually be expanded into a broader strategy. Quick wins are needed to get there.

It is great to know that in prevailing Identity Management thought, the Quick Win concept is still valid.  Back in June, 2005, I authored a post entitled "Quick Wins for Identity Management," highlighting "Sun’s Quick Win philosophy."  In that article, I proposed:

The value of a quick win project should not be underestimated. A number of advantages can accrue:

  • Measurable results are quickly demonstrated
  • Project momentum is maintained for future phases
  • The likelihood of continual sponsorship is increased
  • The system architecture is progressively validated
  • Configuration components are more easily reused
  • Impact on the enterprise is more easily understood

It is interesting, and not altogether coincidental, that a post I wrote earlier today featured the AegisUSA announcement of "Identity Appliances" to reduce entry costs and accelerate time to value.  The AegisUSA offering is yet another validation that the Quick Win philosophy really does work.

So, let me leave you with Felix’s final words:

As usual, those who take a good long-term view are usually rewarded most in the long run. But when strategic initiatives are out, and the thinking is tactical, the above mentioned areas have shown the potential for quick wins. These quick wins have additional benefits because they can be everybody, but that cannot be an excuse to do nothing – those who are smart and creative will be able to push ahead in front of others. Hopefully these ideas will help you delivering value in these tough times.

… and mine, from the June 2005 article:

We encourage you to make this your philosophy: Segment your Identity Management project into manageable parts. Focus your attention first on the most urgent, most beneficial, most quickly implemented areas of the entire project scope. Drive directly to those areas where you will experience a quick win.

Ladies and Gentlemen, start your engines.

Technorati Tags: , , ,

Comments Off on Quick Wins in Identity Management – Still Alive and Well . Permalink . Trackback URL
 

Aegis USA – Identity Appliances

Identity
Author: Mark Dixon
Thursday, August 27, 2009
4:29 pm

Two of the large challenges in the Identity Management market are the cost of entry and time to value.  With their announcement last week of the AegisUSA Identity Solution Continuum, our friends of AegisUSA are focusing on both of those challenges. 

I think the most innovative part of this announcement is the unveiling of appliance-based turnkey solutions "that deliver enterprise-level identity management functionality. Aegis Identity Appliances arefunctional IAM solutions configured to scale for future identity management growth and expansion. Preconfigured Appliances include Password Management, Single Sign-On (SSO), Federated Identity InCommon® Quickstart, and Google Apps Provisioning, with additional point solutions planned in the near future."

Helping companies quickly and easily accrue real value in Identity Management while building a solid foundation for future expansion is a fundamental best practice for Identity Management.  It appears that the AegisUSA approach should bring real value to customers.

Technorati Tags: , , , ,

Comments Off on Aegis USA – Identity Appliances . Permalink . Trackback URL
 

links for 2009-08-25

General
Author: Mark Dixon
Tuesday, August 25, 2009
2:01 am
Comments Off on links for 2009-08-25 . Permalink . Trackback URL
 

links for 2009-08-24

General
Author: Mark Dixon
Monday, August 24, 2009
2:00 am
Comments Off on links for 2009-08-24 . Permalink . Trackback URL
 

links for 2009-08-23

General
Author: Mark Dixon
Sunday, August 23, 2009
2:00 am
Comments Off on links for 2009-08-23 . Permalink . Trackback URL
 

links for 2009-08-22

General
Author: Mark Dixon
Saturday, August 22, 2009
2:00 am
Comments Off on links for 2009-08-22 . Permalink . Trackback URL
 

links for 2009-08-21

General
Author: Mark Dixon
Friday, August 21, 2009
2:00 am
Comments Off on links for 2009-08-21 . Permalink . Trackback URL
 

links for 2009-08-20

General
Author: Mark Dixon
Thursday, August 20, 2009
2:00 am
  • "The technology behind Computrace® LoJack® for Laptops by Absolute® Software is the Computrace Agent, a small software client that is embedded into the BIOS firmware of most computers at the factory. Or you can install it yourself."
    "The Agent in your computer maintains daily contact with the Absolute Monitoring Center. If you report your computer stolen, Agent contact will increase to every 15 minutes. Increased contact allows us to obtain specific details like the physical location of your computer, any activity that has occurred post-theft, and other important data that will aid us in working with local law enforcement."
  • "After months of committee meetings and hundreds of hours of heated debate, the United States Congress remained deadlocked this week over the best possible way to deny Americans health care."
  • "Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws. "
Comments Off on links for 2009-08-20 . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.