
Introducing Research - Top Emerging Technology Predictions for Technology and Service Providers (TSPs)
by Rajesh Kandaswamy | December 10, 2019
Emerging technologies play a large role in helping TSPs build competitive advantages, win new business, grow margins and capture a larger market share. It is vital for decision-makers at TSPs...

Does Decentralized Identity Need an Identity Neutrality Manifesto
by Homan Farahmand | July 12, 2018
If you are not familiar with the decentralized identity, you can start here.
The promise of decentralized identity – self-sovereign identity in the case of people identity – is to...

Making The Most Of Media Consolidation
by Eric Schmitt | June 20, 2018
Anyone within a country mile of digital ad buying is well aware that Google and Facebook wield formidable influence over the industry. But even those in the business are sometimes...

Decentralized Identity Hard Work Begins
by Homan Farahmand | February 15, 2018
Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Six Degrees of Marketing Identity
by Martin Kihn | July 21, 2017
Imagine two scenarios:
Scenario #1: Lizzy shops for a tartan dog leash on Leashy.com and makes a purchase. She is bombarded with ads for the same leash for months. Frustrated, she...

Robotic Process Automation Knocking on IAM Door!
by Homan Farahmand | February 3, 2017
Manual and tedious identity governance and administration tasks can bring chills to many IT leaders when it comes to planning resources in a budget cycle. It is almost an accepted...

Testing Your IAM Planning Decisions Needs a Robust Risk Model
by Homan Farahmand | April 27, 2016
IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

AuthN TNG: Many Factors, Confidence, and Risk Scoring
by Ben Tomhave | September 12, 2013
Caveat: I'm part of the Security and Risk Management Strategies (SRMS) team, and not part of Identity and Privacy Strategies (IdPS). Also, fair warning... this is an incomplete thought and...

The Glazer Gotta Equation: How enterprises evaluate their concerns about social tools
by Ian Glazer | August 3, 2010
Last week at Catalyst North America, Mike G and I unveiled our only-slightly-ridiculous Glazer Gotta Equation. This equation describes the factors that an enterprise evaluates during its consideration to deploy...