WHY ITSM IS NOT IDENTITY MANAGEMENT (IdM/IAG)

ITSM & IdM Convergence = Request Orchestration Organizations continue to be challenged by increasingly complex compliance and regulatory demands, while simultaneously being pressured by shrinking budgets. Faced with the seemingly impossible paradox to “do more with less”, many organizations are struggling to effectively understand what accounts and entitlements users hold across various enterprise systems. Up […]

> Keep reading

Posted Monday June 5, 2017permalink

N8 Identity Inc. Unveils Workforce Identity And Access Management Tool

Jay O’Donnell, CEO of a Canadian identity and access management company that counts some of this country’s biggest telecommunications carriers and banks as customers, sits in his chair and recalls what he wanted to do when he graduated from a community college computer course.

> Keep reading

Posted Wednesday June 26, 2013permalink

Do You Know Who Has Access To Your Data?

Big Data is the king of retail now. Whether you are talking about customer, inventory, financial, or employee data, information is the key to driving retail growth. Think about it. Every system or solution used in retail is now feeding the company information. The POS is tracking basket size, exceptions, number of items purchased, speed of checkout, and a million other things. The IP surveillance cameras are capturing traffic data, demographics, conversion, wait times, and customer service. The CRM is tracking preferences, purchase histories, and loyalty. The WFM system is tracking hours, payroll, skill levels, tasks completed, and training.

> Keep reading

Posted Tuesday May 7, 2013permalink

N8 Identity Enables Compliance and Reduces Risk with its New Approach to Identity and Access Governance

“The majority of vendor solutions take a reactive approach to identity management (IAM) by allowing policy violations to occur and then reporting on access violations after the fact. Our flagship product, Employee Lifecycle Manager (ELM), is breaking new ground in the IAM industry by taking a proactive approach and preventing inappropriate access from being granted and identity governance violations from occurring in the first place. This ensures continued compliance with SOX, HIPAA, PIPEDA and other federal security regulations.”

> Keep reading

Posted Wednesday March 6, 2013permalink

Bringing Tech and Business Together

“Compliance requirements are a big driver for IT teams in charge of identity and access management (IAM). Previously confined to the chief information security officer’s office, Sarbanes Oxley and other federal guidelines are making IAM a business-wide concern. Understanding who should have access to what information within a business is a deceptively complicated problem that has the potential to spark arguments among even the best relationships across the company.”

> Keep reading

Posted Wednesday March 6, 2013permalink

Bringing Tech and Business Together

“Compliance requirements are a big driver for IT teams in charge of identity and access management (IAM). Previously confined to the chief information security officer’s office, Sarbanes Oxley and other federal guidelines are making IAM a business-wide concern. Understanding who should have access to what information within a business is a deceptively complicated problem that has the potential to spark arguments among even the best relationships across the company.”

> Keep reading

Posted Wednesday March 6, 2013permalink