Identity: The Keystone of Security

Okay, I’ve started this blog post with a deliberately controversial title, which truthfully is intended to be a bit of a thought experiment. Let’s suspend our disbelief, and think about the security landscape from this perspective for a few minutes. Really, this posting is intended to recap my thoughts and impressions from last month’s RSA…

Security for the Industrial Internet – Where Are We Going?

I recently attended the quarterly face-to-face meeting of the Industrial Internet Consortium (IIC) – a rapidly growing organization dedicated to identifying, assembling, and promoting best practices for the industrial internet. This organization, which just celebrated its 1-year anniversary, has grown to over 150 members – including EMC – across a broad set of technology, manufacturing,…

Leadership, Unsolved Problems, and a 2015 New Year’s Resolution

On behalf of the entire Identity and Access Management team at RSA, I’m pleased to note that Gartner has positioned RSA, the Security Division of EMC, as a Leader in their Identity Governance and Administration Magic Quadrant, for the second year running. We’re clearly happy with this — we believe it reflects our continued innovation, strong…

What is the Internet of Things? And Why is Securing it so Important?

In the past few months, we’ve all likely heard a great deal about the “Internet of Things” (IoT), along with plenty of hype about how it’s going to revolutionize so many aspects of our lives. Smart light bulbs! Internet-connected refrigerators! A digital mesh of autonomous cars! Like many overly hyped ideas, of course, reality is…

Overcoming Barriers to Identity-as-a-Service

Like many organizations, you may be considering a cloud-based identity service (also referred to as Identity-as-a-Service, or IDaaS). If you are unsure whether a cloud-based solution is right for you, we recommend that you take a look at our recent blog post on that subject. If you decide that IDaaS might be a good fit…

Unlocking Identity Intelligence  

Identity Intelligence is a term you may have heard lately – and it represents the next level of IAM program maturity, for which many organizations are now aiming.  Robust identity intelligence can guide the right access decisions across the identity lifecycle, helping to minimize risk and enable compliance with internal guidelines and external regulations.  Doesn’t…

Jump Start your IAM Program Today

Is your IAM program stuck in the doldrums? Has it failed to deliver on its promised business value? Are you mired in the quicksand of building (or rebuilding) application connectors or performing too many manual tasks? Take some comfort in the fact that you’re not alone – thousands of organizations worldwide are struggling with exactly…

Jump Start your IAM Program Today

Is your IAM program stuck in the doldrums? Has it failed to deliver on its promised business value? Are you mired in the quicksand of building (or rebuilding) application connectors or performing too many manual tasks? Take some comfort in the fact that you’re not alone – thousands of organizations worldwide are struggling with exactly…

What’s the Business Value of IAM?

As a market discipline, Identity and Access Management (IAM) has matured over the past several years. As vendors (such as RSA Aveksa) have entered the market with more modern offerings, organizations have been able to successfully shift the focus of IAM away from being solely an IT tool to being a system that can deliver…

What’s the Business Value of IAM?

As a market discipline, Identity and Access Management (IAM) has matured over the past several years. As vendors have entered the market with more modern offerings, organizations have been able to successfully shift the focus of IAM away from being solely an IT tool to being a system that can deliver concrete business value. Taking…