Identity and Access Management - Blog - Identity and Access Management - Dell Community
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that must be absolute. Of course, it would be great if we could jump in our DeLorean, accelerate to 88 miles per hour and decide to only implement solutions that had integrated security, but even then we would still probably choose incorrectly. Can we really know what security we will need in the future? Since we can’t go back in time and decide...
  • Big Decline in Federal Leaders Confidence in Agency Cybersecurity

    We commission several surveys of the IT marketplace every year. It’s one of the ways by which we keep up with broader technology trends so as to make sure that our security solutions meet your needs. With so many changes taking place in technology, our surveys usually cover new ground. But this year, we took the opportunity to revisit a federal cybersecurity survey from two years ago, with some unanticipated results. This year’s Government Business Council survey of federal leaders, Achieving Holistic Cybersecurity: 2016 Progress Report, follows up on a similar GBC survey from...
  • Join us for the One Identity User Conference

    October 12-13, 2016 | New Orleans, LA Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts, engineers and fellow users. Benefits to attend: Learn best practices and tips and tricks to improve technical proficiency and knowledge of Identity Manager Access the Identity Manager product engineers and experts directly and engage in interactive discussions Discover new capabilities in Identity Manager v7.0x Receive valuable...
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency of its internal processes by 2020. The university employed several tools over time to try to gain control of IAM, including an attempt to build a tool in-house, “but none of them were capable enough for our needs,” says Golob. “We simply had too many disparate systems to work with. We wanted one digital identity for...
  • Everything and Everyone Becomes Connected

    Digital Transformation adds billions of connected devices and things to what we already have in place. Therefore, we must learn to manage and thrive with the complex relationships of new organizations and their systems, devices, things and people It is not only about users accessing a system anymore – it is about complex interactions and relationships between multitudes of devices. New trends, such as Identity Relationship Management (IRM) are looking at ways of handling the identities of all humans, services, devices, and things and their complex and ever-changing relationships. IAM...
  • Digital Transformation Is More Than Just IoT

    Many people associate Digital Transformation with connecting things – the IoT (Internet of Things) as the quintessence of Digital Transformation. Connected things are part of the transformation, but it is about everything – business models, services, connected things, ecosystem, etc. Thus, a broader view is required, as outlined in these more detailed fundamentals: Digital Transformation is already a reality in many industries – without any connected things Industry 4.0 (or smart manufacturing) is about connecting manufacturing environments and Operational Technology...
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with many daughters off to live on campus, her parents talked to her about campus security until she couldn’t help but roll her eyes. But the one looming thing that isn’t on Anna’s mind is the security on her college’s network. For her university, however, cybersecurity is of utmost importance. Today’s students, like Anna...
  • Digital Transformation Affects Every Organization

    A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples include the automotive industry being challenged by companies such as Apple or Google; the taxi industry being challenged by Uber and others; the banks being challenged by PayPal. Most industries, both in manufacturing and in services, are facing challenges from the Digital Transformation of businesses – and many...
  • Digital Transformation: Why Security and Privacy Matter

    Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore, connecting things with apps and services imposes new challenges, such as product security, liability issues, and how to appropriately handle customer data. This document discusses how IT must transform in general and how Information Security can be a business enabler for Digital Transformation. Digital Transformation is not a one-time makeover...
  • Global Survey: Digital Transformation Accelerated When IT Security Is Included in Planning

    The global Digital Transformation Security Survey , executed by Dimensional Research , queried 631 IT decision-makers about the impact of digital transformation on security teams. Survey responses indicated that businesses expect growth and have plans to invest in new technologies that will help them make the digital transformation. So chances are that your organization will undergo a digital transformation whether you’re personally ready or not! Here’s a sampling of survey findings: 97 percent of global respondents say they’re investing in digital technologies to transform...