Identity and Access Management - Blog

  • How to Get Active Directory Out of the Way so You Can Reach Your IAM Objectives

    The whole point of identity and access management (IAM) is to ensure that the right people have the right access to the right stuff at the right time in the right way and that all the other right people say that it’s okay that they have that access. The vast majority of IAM projects aspire to “get it right” across the entire enterprise (applications, data, and systems), including all user populations (employee, administrator, partner, customer, etc.), and all access types (on-prem, remote, BYOD, etc.) but they usually get bogged down with one system or another and end up going...
  • Web Designer Development Best Practices With Dell One Identity Manager

    Attend the Dell World Software User Forum , to deep dive into Dell’s latest innovations – including the latest Dell One Identity Manager capabilities. We’ve highlighted two IAM-focused sessions to give you a taste of what’s in store for you and your colleagues: Dell One Identity Manager Round Table – This panel discussion is designed to give users of Dell One Identity Manager an open forum in which to share best practices, guidance, and recommendations with peers and Dell product management. Web designer development best practices - This lab provides best...
  • Work/Life Balance: Navigating the Rugged Terrain of Identity and Access Management (A "Real IT Story)

    If you’re like most people I talk to (and I only talk to IAM people), keeping up with the ins and outs of user accounts, privileged accounts, data and application access, and governance can be like having two, three or four full-time jobs. In addition to managing access for any variety of user groups — which are constantly moving targets — you have to be vigilant in avoiding security risks and still address those annoying compliance issues. Cumbersome administration practices, failed access attempts, the need to keep your people productive, and disjointed controls and tools...
  • 5 Active Directory Security Best Practices… AKA Check your Shoelaces Before you Start the Race

    Years ago, when I was much younger, skinnier, and tougher, I was a pretty good runner. In fact for a couple of years I was the fastest female marathon runner in the state of Utah (we won’t mention the fact that I’m a guy, and couldn’t get close to the top male runners, so I measured myself against the top women). One time I was running a local 5K that was on a very fast course. As always, I had sized up the field and chosen the woman that was projected to win the race as the one that I would not let out of my sights until I passed her in the last quarter of a mile. The gun...
  • Federal Agencies Hit the Ground Running - Can They Keep Up the Pace?

    The race is over and the results are in. In a recent blog post , Federal CIO Tony Scott reported on the results from the 30-Day Cyber Sprint, highlighting marked federal cybersecurity improvements. Though Scott applauded agencies for their efforts, he underscored that there is still more work to be done. The sprint is complete, but the Marathon is just beginning and the finish line is far from sight. Prior to Tony Scott’s 30-Day Cyber Sprint, federal agencies' use of two-factor authentication was alarmingly low. As of December, nine federal agencies didn’t require two-factor...
  • Identity and Access Management: Once Bitten, Twice Shy

    For years, Identity and Access Management (IAM) has carried with it a reputation for denial, restriction, limitation, and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue generating and… blah, blah, blah. Let me boil it down for you. Fundamentally, you’re probably in one of these three camps: You have lived through, or are living through, an IAM project gone wrong You’re new to IAM and/or You’re trying to secure funding for your security/IAM project ...
  • Key Takeaways from Black Hat USA 2015

    I just returned from the annual Black Hat USA 2015 Conference in sunny Las Vegas, NV. As you may know the conference is dedicated to IT Security, and it is apparent to anyone that attended the conference that the space is growing at a tremendous rate. This was the first time I attended Black Hat and was very impressed with the size of the show, the enthusiasm of the people that we visited with and the briefings that were given. A couple of things I took away from the show: Security is big, even outside of the IT circles. When my friends and family members learned I was attending Black Hat...
  • Identity and Access Management: A New Generation Is Making Waves

    As demonstrated by recent, well-publicized cyber-attacks it’s clear that Identity and Access Management (IAM) is in need of a fresh perspective. Previous attempts at erecting barriers, such as manual processes for requesting and granting user, group and data access; the expansion of new applications; and heavy IT involvement (including over-provisioning to ensure access), have nonetheless left many organizations vulnerable. The next-generation of Identity and Access Management (IAM) solutions are changing that. By placing access-control decisions in the hands of the business owners, new...
  • Mobility and Compliance with Dell One Identity Manager

    Attend the Dell World Software User Forum 2015 to deep dive into Dell’s latest innovations – including the latest Dell One Identity Manager capabilities. We’ve highlighted two IAM-focused sessions to give you a taste of what’s in store for you and your colleagues: Dell One Identity Manager – Mobility and Compliance Part 1 - This comprehensive lab demonstrates the integration between Dell One Identity Manager and Dell’s mobility solutions. Dell One Identity Manager – Mobility and Compliance Part 2 - This lab will delve deeper into the mobility capabilities...
  • The Top 5 Challenges with Active Directory Management

    We all have Active Directory (AD), and love it or hate it, we cannot survive without it. Nothing brings IT to a grinding halt faster than an inability of users to logon to the critical systems accessed through AD. When people can’t get to Exchange, or SharePoint, or Lync, or the file servers that hold all their critical data, you know you’re going to hear about it and you’re going to keep hearing about it until you fix it. The problem is AD is notoriously difficult to manage with native tools. Dell, and the Dell identity and access management practice in particular, is the...