Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Is your security program a roadblock?Read Now

IGA Is Closing the Gap with Standalone Password Management Tools

by Brian Iverson  |  April 23, 2015

This is the eighth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

It's Time to End the Laundry List RFP for IGA Solutions

by Brian Iverson  |  April 23, 2015

Identity governance and administration (IGA) is a mature market, yet I still review RFPs for clients that include long laundry lists of routine requirements that are addressed by pretty much...

Read more »

It's Not Just Connectors We're Looking For With Fulfillment in IGA

by Brian Iverson  |  April 21, 2015

This is the seventh installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

My Top 7 Popular Gartner Blog Posts for March

by Anton Chuvakin  |  April 14, 2015

Most popular blog posts from my Gartner blog during the past month are: Killed by AI Much? A Rise of Non-deterministic Security! (security analytics research) SIEM/ DLP Add-on Brain? (security...

Read more »

The Future Is Here ... And It Is ... Network? Endpoint?

by Anton Chuvakin  |  April 9, 2015

We lost the network – MUST focus on the endpoints! We lost the endpoint – MUST focus on the network! We lost the network – MUST focus on the endpoints!...

Read more »

Speaking at Gartner Security & Risk Management Summit 2015

by Anton Chuvakin  |  April 7, 2015

Gartner Security & Risk Management Summit 2015 is coming soon [well, for some definition of "soon" :-)]! Here is my traditional blog post summarizing my speaking at this event (Washington,...

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

Why Does Access Certification Even Have to Exist Any Longer?

by Brian Iverson  |  March 30, 2015

This is the sixth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

Why an Identity Repository Should Not Be Treated as an Account Repository

by Brian Iverson  |  March 25, 2015

With identity governance and administration (IGA), the identity repository is intended to track identity-related information for people who are authorized to access managed systems. Unfortunately, most IGA products on the market...

Read more »

The Sorry State of IGA Policy Management

by Brian Iverson  |  March 25, 2015

This is the fifth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »