Gartner Blog Network

Category: 'iam' Blog Posts

from the Gartner Blog Network

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »

Making the Right Identity Choices for Azure AD and Office 365

by Mark Diodati  |  March 1, 2016

Based upon a recent survey, 62% of Gartner’s clients plan to migrate to or implement Office 365 in the next few years. And if you are using Office 365, you...

Read more »

Chasing the Long Tail of Fine-grained Authorization

by Homan Farahmand  |  February 9, 2016

Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...

Read more »

When IAM Meets (the Idea Of) Blockchain!

by Homan Farahmand  |  January 24, 2016

It seems the technology market has an emerging champion, Blockchain! Every day we hear how Blockchain can change the world. What most interest me is how Blockchain may affect the...

Read more »

The Identity of Things for the Internet of Things

by Earl Perkins  |  August 4, 2014

It is amusing to see the marketing currently attempted by using an offshoot of the phrase "Internet of Things". Of course, as an analyst I am no different, so I...

Read more »

Securing Operational Technology and the Internet of Things

by Earl Perkins  |  January 10, 2014

Welcome to my first blog post in my new role within the Gartner security analyst team. I am starting a series of posts on two relatively new areas of Gartner...

Read more »

IAM Summit 2013

by Ian Glazer  |  November 14, 2013

Next week is our Identity and Access Management Summit. I wanted to give you a sneak peek at what the team will be bringing to LA. See you Sunday! Sunday...

Read more »

Catalyst for identity professionals: We’ve got both kinds of content!

by Ian Glazer  |  July 2, 2013

We are less than 30 days out from Catalyst and I can tell you that the team is pumped to be back on stage talking identity with all of you....

Read more »

The Snowden Snowjob: Supergluing USB ports

by Jack Santos  |  July 2, 2013

While the drama about Edward Snowden continues, it’s interesting to see the effects.  Clearly, this is an inflection point in the perception of security, especially insider risks.   Every CEO’s worst...

Read more »