Identity and Access Management: Once Bitten, Twice Shy

For years, Identity and Access Management (IAM) has carried with it a reputation for denial, restriction, limitation, and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue generating and… blah, blah, blah. Let me boil it down for you.

Fundamentally, you’re probably in one of these three camps:

  1. You have lived through, or are living through, an IAM project gone wrong
  2. You’re new to IAM and/or
  3. You’re trying to secure funding for your security/IAM project

This high-quality, completely-over-produced graphic depicts your challenges:

 

For those of you in the upper right quadrant, that answer is basically: “What is your pain?” Is it two factor authentication? Single sign-on? Privileged accounts?

Here’s a tip: Learn how you can position your security/IAM project as a business enablement tool. Looking at the project through the lens of the business owner, you’re likely to find additional sources of funding for those IT organizations that might be wary of investing in IAM, especially those who may have already “touched the hot stove” several times.

If any of this sounds like you, my latest white paper, Get Your IAM Project Back on the Fast Track by Considering Business Agility, deals with all that and more. I recommend you take a read. It’s quick and interesting (even if I have to say that because I wrote it). I’d appreciate your feedback. Thanks!

Anonymous