Identity and Access Management community: Discover and share best practices to control IAM for your real world.
Last week, some of the Identity and Access Management (IAM) team from Dell Software converged on the city of San Diego for Gartner’s annual Catalyst conference.
It was a long week filled with lots of good information, conversations and fun. Here are some of the highlights of the week.
If you didn't get a chance to attend the event, be sure to check us out at Dell World November 4th – 7th or the Gartner Identity and Access Management summit December 2nd – 4th.
Missed the Dell Security webcast series? Not to worry. We recorded the sessions for you. We all have to protect our environments and ensure internal and external compliance requirements are met. But, how well-equipped are you to transform your security role to one of not just protection and assurance, but of business enablement? Move the conversation in your organization away from fear, uncertainty, and doubt to one of business enablement.
Check out this informative series now! Learn more about Dell’s security solutions and how they can help your organization.
View the On-demand Webcast with security expert Randy Franklin Smith on: Exploring a Fully Automated IAM Environment
You can discover strategies and tools to make it easy for you to:
View Webcast Now
We just found out that Dell One Identity Manager has won GOLD in the “Enterprise Product of the Year – Software” category for the Best of Biz International Awards!
The Best in Biz Awards program is judged by members of the press and industry analysts from around the world.
You can see the full list here - http://intl.bestinbizawards.com/intl-2014-winners-product/
To learn more about Dell One Identity Manager, click here.
Webcast: Exploring a Fully Auotmated IAM Environment
Date: Tuesday, July 22nd
Time: 11:00 a.m. ET
Have you ever wondered what would it be like to have a fully automated IAM environment? Envision streamlining every step of an employee’s access, from initial request through termination, and everything in between. Imagine the time savings.
Now you can see all that and more in action. Join Randy Franklin Smith, CEO, Monterey Technology Group, and George Cerbone, Principal Solutions Architect, Dell Software, as they take you through every step using today’s IAM solutions.
Attend this webcast to discover how to:
All of that and more is possible with today’s IAM technology and in this webinar we are going to demonstrate what such an environment looks like.
First we’ll step through the life-cycle of an employee and watch as a new hire in Orange HR triggers the creation of accounts in AD, automatic provisioning of physical access badge and standard entitlements for the department where the new employee starts off.
Then we’ll watch what happens as that employee requests additional access, separation of duty violations detected, job changes and finally she exits the company. I think you’ll be amazed at how easy this is for end-users and line of business managers and how absent IT is in this entire cycle – which is a good thing.
Dell One Identity Manager is one of the leaders in the various identity categories within IAM/IAG. The products are well-designed, well-integrated and complete. While the bulk of the development of the products occurred before Dell acquired them, there’s been no deterioration in quality and some improvement in interoperability in the short time since Dell acquired Quest.
Customers who are looking for the first Identity Management suite or those unhappy with their current choice, should include Dell One Identity Manager in the vendor mix they’re evaluating. So too, for the rest of the Dell IAM/IAG product line – all solid performers.
With the caveat that Dell has but a short track record in IAM/IAG we can nevertheless strongly recommend the line.
Read the full report
A few weeks ago Dell Software hosted a webinar titled Extending SharePoint Access to External Users, the recording can be found here. There were lots of attendees and lots of questions were asked during the webinar. What I intend to do in the next few paragraphs is to summarize the webinar content and hopefully get you to think about your environment, what you can do, and how Dell Software can help.
First we discussed three market trends that make it inevitable to extend SharePoint to external users
Then we listed a few market challenges that may delay or stop organizations from extending SharePoint access to external users
And finally we introduced the features that ought to be in a complete solution that would allow us to extend SharePoint to external users. And on this subject we mentioned the solution needs to provide:
Extending SharePoint to external users is inevitable in today’s market. Today SharePoint offers a wide range of capabilities, organizations are collaborating in smarter ways than ever before, and the list of application pools we access is getting larger. Sure there are challenges that may stop or delay us from opening up SharePoint content and access to external users such as security and compliance concerns, but there are solutions that can help us along the way, and Dell software provides end to end solutions around all of these challenges.
Look back at your environment and start thinking about the frequency in which you get asked to extend SharePoint to external users. Are those requests increasing or decreasing? What is stopping you from extending SharePoint to external users? Do you have security concerns, or compliance concerns? Do you have any published guidelines for how to extend SharePoint access? Do you monitor or audit such access? Do you have other social means of collaboration? Do you use other collaboration software such as Google Docs, DropBox, Box.net, or yammer?
And as you try to find answers to the above common concerns and as you try to lay a foundation for a solution please reach out to us here at Dell software as we've worked together with many organizations in the past that’ve had similar challenges.
Watch our latest video on how Dell One Identity solutions can simplify and secure Identity and Access management
We all have to protect our environments and ensure internal and external compliance requirements are met. But, how well-equipped are you to transform your security role to one of not just protection and assurance, but of business enablement?
Join us: Tuesday, July 1 at 2:00 PM ET/11 AM PT
Attend this webinar to learn how to:
Register for this webinar to learn more about connected security, including network security, identity and access management and data encryption, while also gaining ways to look past the scare tactics, fear, uncertainty and doubt, and focus on the business first.
Register Now >>
By now you should know that Dell Software will be attending Gartner Security & Risk Management Summit. If you’ve missed some of the details or you’d like to read the official all up Dell communication about our involvement in the event, please take a look at the Direct2Dell post, Better Security is Better Business: Dell at Gartner Security & Risk Management Summit by Scott Lang, Director, Solution Marketing at Dell.
The Identity and Access Management team is looking forward to seeing you at the event!