Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Why an Identity Repository Should Not Be Treated as an Account Repository

by Brian Iverson  |  March 25, 2015

With identity governance and administration (IGA), the identity repository is intended to track identity-related information for people who are authorized to access managed systems. Unfortunately, most IGA products on the market...

Read more »

The Sorry State of IGA Policy Management

by Brian Iverson  |  March 25, 2015

This is the fifth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

Good Workflow Support in IGA Requires More than a Graphical Editor

by Brian Iverson  |  March 23, 2015

This is the fourth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

Is "One-Stop Shopping" for Access Requests Finally a Credible Objective with IGA?

by Brian Iverson  |  March 20, 2015

This is the third installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

Our Team Is Hiring Again - Second Position Open: Join Gartner GTP Now!

by Anton Chuvakin  |  March 19, 2015

Our team at Gartner is HIRING for one more role! Join Security and Risk Management Strategies (SRMS) team at Gartner for Technical Professionals (GTP)! Excerpts from the job descriptions (#1...

Read more »

IGA Appears to Be Making Progress Toward Business Enablement

by Brian Iverson  |  March 19, 2015

I facilitated an analyst-user roundtable during the just-completed European Gartner IAM Summit in London on the topic of "Selling IAM to the Business". Analyst-user roundtables are great opportunities for conference delegates who...

Read more »

The Triumph of IGA Entitlements Management

by Brian Iverson  |  March 18, 2015

This is the second installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

Beyond Join-Move-Leave with IGA Identity Life Cycles

by Brian Iverson  |  March 16, 2015

This is the first installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

New IGA Magic Quadrant Contexts Have Published

by Brian Iverson  |  March 13, 2015

You wouldn't know about this if you weren't looking for it, so I want to let the world know that some new IGA Magic Quadrant content was published on March...

Read more »

Ready for the 2015 European IAM Summit in London

by Brian Iverson  |  March 11, 2015

I'm traveling to Europe this evening to prepare for the 2015 European IAM Summit London (after a quick stop in Edinburgh for client meetings), which takes place March 16-17 at...

Read more »