How Can a Company Guarantee a Successful, Strategic Identity and Access Management Program?
The Gartner Identity and Access Management Summit is right around the corner and leaders from all over the world will be coming to try to get this question answered. Here are a few ideas from our ten years in the industry.
Strategic Identity and Access Management (“IAM”) projects can be difficult and the new challenges with mobile, social, and cloud compound the problem. Protecting the perimeter is not enough anymore. Safeguarding identities are the key to a truly secure enterprise.
The industry has seen way too many train wrecks with IAM. To get beyond basic capabilities and really use IAM systems as a foundation for strategic IT, a company MUST take the time up front to consider the long-term plan. Near-term, immediate priorities can be solved with client-based single sign-on, basic provisioning, simple roles and audit reports. But with a short-term (and maybe short sighted) plan, a company can just as easily limit their ability to solve more complex problems.Read More»
How Levi leveraged Identity Management infrastructure to enable “just in time” fully automated privileged system access
- Chuck Lankford, Global Director of Security at Levi Strauss & Co.
- Chris Fields, Vice President of Security Strategy, PathMaker Group
- Ravi Srinivasan, Director of IBM Security, Strategy, and Product Management
In our 50 minute webinar you will:
- Learn about the latest market trends in Identity and Access Management
- See why the IBM IAM Suite is one of the hottest sellers in the last six months
- See what’s new with the IBM IAM Suite including upcoming features and capabilities
- Hear what customers are buying and why
- Learn the five most common benefits from a robust IAM infrastructure
- Learn about best practices for implementing provisioning, access management, federation
- Hear customer use cases and their key business drivers for IAM
About the key presenter, Chuck Lankford:
About Chris Fields:
About Ravi Srinivasan:
A little background:
Now that you’ve been in the CIO’s position for your first quarter, it is time to prepare for your first review with the board of directors. The agenda for the IS presentation will cover key factors that you discovered in your operations, your accomplishments and your plans for the next year. Since this is the quarter for your next year’s budget, it should contain the funding needed to accomplish the IS plan.
One of the key factors in the review of your operations was discovering the lack of security focus and non-compliance issues that made the operations vulnerable to unwanted intrusion in your network. Listed in your accomplishments is the Security Assessment study and recommendations provided by PathMaker Group when you engaged them for a study of your IS environment. One of their recommendations was to deploy IBM’s Security products for managing Identify and Application Access in your enterprise network. This is an important undertaking as your company will replace the outdated security monitoring with IBM’s Showcase Solution to keep unwanted intruders out while making it easier for the authorized users to have easy access to their applications. As a result of PathMaker Group’s findings and recommendations, you asked them to submit a proposal for the corrective solution using IBM Security Products and PMG Professional Services to deploy them in your IS Network.
This section of your review was very well received by the board of directors and they gave you the approval to get started.Read More»
To Register for this Event, Please Click Here!
While integrating Oracle Identity Manager within a corporate environment, sometimes it is important to change some user attributes externally. OIM API provides simple means to perform these operations.
As is the case in any operation, a connection needs to be made to the OIM instance. This is a simple task, but one must ensure that credentials are properly stored and protected.
protected static OIMClient client;
private static String OIMInitialContextFactory = “weblogic.jndi.WLInitialContextFactory”;
public OIMConnect(String fileName) throws Exception
Hashtable<String, String> env = new Hashtable<String, String>();
client = new OIMClient(env);