Gartner Blog Network

Tag: 'identity' Blog Posts

from the Gartner Blog Network

Introducing Research - Top Emerging Technology Predictions for Technology and Service Providers (TSPs)

by Rajesh Kandaswamy  |  December 10, 2019

Emerging technologies play a large role in helping TSPs build competitive advantages, win new business, grow margins and capture a larger market share. It is vital for decision-makers at TSPs...

Read more »

Does Decentralized Identity Need an Identity Neutrality Manifesto

by Homan Farahmand  |  July 12, 2018

If you are not familiar with the decentralized identity, you can start here. The promise of decentralized identity – self-sovereign identity in the case of people identity – is to...

Read more »

Making The Most Of Media Consolidation

by Eric Schmitt  |  June 20, 2018

Anyone within a country mile of digital ad buying is well aware that Google and Facebook wield formidable influence over the industry. But even those in the business are sometimes...

Read more »

Decentralized Identity Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »

Six Degrees of Marketing Identity

by Martin Kihn  |  July 21, 2017

Imagine two scenarios: Scenario #1: Lizzy shops for a tartan dog leash on Leashy.com and makes a purchase. She is bombarded with ads for the same leash for months. Frustrated, she...

Read more »

Robotic Process Automation Knocking on IAM Door!

by Homan Farahmand  |  February 3, 2017

Manual and tedious identity governance and administration tasks can bring chills to many IT leaders when it comes to planning resources in a budget cycle. It is almost an accepted...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

AuthN TNG: Many Factors, Confidence, and Risk Scoring

by Ben Tomhave  |  September 12, 2013

Caveat: I'm part of the Security and Risk Management Strategies (SRMS) team, and not part of Identity and Privacy Strategies (IdPS). Also, fair warning... this is an incomplete thought and...

Read more »

The Glazer Gotta Equation: How enterprises evaluate their concerns about social tools

by Ian Glazer  |  August 3, 2010

Last week at Catalyst North America, Mike G and I unveiled our only-slightly-ridiculous Glazer Gotta Equation. This equation describes the factors that an enterprise evaluates during its consideration to deploy...

Read more »