Ian Glazer

A member of the Gartner Blog Network

Entries Tagged as 'iiw'


The Newest Members of Our Team: Mary Ruddy and Nick Nikols

by Ian Glazer  |  November 1, 2012  |  3 Comments

No, faithful readers, this isn’t a repeat of my last post. The Identity and Privacy Strategies has hired once again… well actually twice again. We snagged two more industry luminaries: Mary Ruddy and Nick Nikols. You likely know Mary as a keeper of the Identity Commons flame, tireless participant in IIWs, and major contributor to [...]

3 Comments »

Category: Identity Management Market     Tags: ,

Beyond Industrial Era Identity Management

by Ian Glazer  |  May 23, 2012  |  Comments Off

(The following is the statement I’ll deliver today at the National Strategy For Trusted Identities in Cyberspace event at the White House.) Our way of thinking about identity management is outdated. This outdated thinking poorly reflects the way we interact on Main Street, and it doesn’t fit the needs of people and enterprises trying to [...]

Comments Off

Category: Federated Identity Identity Management Market     Tags: , , ,

Put 100 Relying Parties in a Room and What Do You Get?

by Ian Glazer  |  May 17, 2012  |  5 Comments

It’s an open secret among us identity geeks that, despite all of federated identity’s progress, one thing has lagged significantly: relying party participation1. Getting relying parties to the table, to talk about challenges they have with identity on the Internet, has always been a hard problem. Although the identity community has grown, the number of [...]

5 Comments »

Category: Federated Identity     Tags: ,

Thoughts from IIW East

by Ian Glazer  |  September 15, 2010  |  4 Comments

Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card game. Ever. I’d estimate that about half of the un-conference sessions touched on NSTIC – the Nation Strategy for Trusted Identity in Cyberspace. Now, you [...]

4 Comments »

Category: Identity and Access Governance     Tags: , , ,