Identity and access management reflections

Reflections, musings and ideas about identity and access management.

Saturday, August 10, 2013

Nothing is scarier than a business user with a credit card - collaboration

›
Over the last couple of months there has been some interesting discussions about the ability of NSA to get access to all kinds of data that ...
Thursday, May 30, 2013

IT Service Catalog in OIM11G R2 - filtering objects

›
In the post "IT service catalog evolution"  I discussed how the set of entitlements that IT offers to the business have been prese...
Wednesday, May 29, 2013

IT Service Catalog evolution

›
One of the eternal problems in Enterprise IAM is to bridge the gap between how the business looks at an entitlement and how this entitlement...
Tuesday, April 16, 2013

Persona based access control

›
One of the design goals of an access control system be it RBAC, ABAC or raw entitlements based is that the user interface should only displa...
Saturday, March 2, 2013

SecurIt Trustbuilder

›
One of the sessions I am looking forward to at Pulse is "IAM-1390 : A Cloud Security Platform Offering Simple, Secure and Fast Digital ...

Pre pulse 2013

›
Pulse 2013 is coming up fast and furious and I am packing my bags. If anyone of my readers is interested in meeting me in person and are ...
Thursday, February 21, 2013

Access recertification in the cloud with CA and Nördic Döts

›
Being born and raised in Sweden I keep a little eye on the Nordic IDM Market and CGI (formerly Logica, formerly WM Data) just closed a deal ...
Tuesday, January 15, 2013

Pulse 2013 - Best practices in IAM

›
Pulse 2013 is coming up soon and I am planning my yearly trip to lovely Las Vegas. This year I will be on a panel titled " Best Prac...
Thursday, December 6, 2012

To encrypt or not to encrypt, that is the question

›
In my last post I wrote about the South Carolina breach and this attack has now made it's way to even vernerable publications like the E...
Wednesday, November 21, 2012

HIPAA and reverse incentives

›
Last week I visited ISA New Englands November member meeting and one of the talks was by Karen Borton about HIPAA . Really good walk through...
1 comment:
Saturday, November 3, 2012

Compliance and security in different verticals

›
I attended a very interesting healthcare round table last week organized by RSA. One of the things that we discussed was how different verti...
1 comment:
Monday, October 8, 2012

IDM in the cloud

›
Recently there was a very interesting discussion around cloud based IDM vendors at Wisegate . The question that was posed was what are the c...
Wednesday, March 7, 2012

Datapower - a blast from the past

›
Back in 2005 I was living in London and working for Sena Systems . Sales were slow in Europe and I was subcontracted out to a partner for a ...
1 comment:
Thursday, February 2, 2012

Stockholm syndrome and Gartner provisioning quadrant

›
I will be speaking at the  Identity and access management  seminar in Stockholm Sweden on May 3 this spring. My talk will primarily cover ...
Friday, January 27, 2012

Useful TIM tips and tricks

›
I ran into a page full of useful TIM tips and tricks that I thought I should share:  IBM Tivoli Identity Manager How To
›
Home
View web version

About Me

Martin Sandren
View my complete profile
Powered by Blogger.