A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces.
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
A discussion on how role based access control may still deliver business value, if deployed in a slightly different way.
Assessment and Advisory for Cyber Security and IAM Solution Providers Receive voice of the customer, use case analysis and market positioning support to help product integration and improve client value.  The What Iterative analysis, comment and feedback on pitch and position, product demonstration and go to market strategy. The Benefits Independent expert comment on product […]
I wanted to expand to this based on conversations I've had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR - what it is and why it's important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
An opinion piece analysing the potential acquisition of ForgeRock by private equity firm Thoma Bravo.
IAM 2 Identity & Access Management Industry Analysis Map We track a range of established and emerging vendors in the global identity and access management ecosystem. Established vendors provide us with meta-knowledge regarding market dynamics, funding, customer budget maturity and stable use cases.  We also track more emerging technologies that relate to IAM in order to […]
Authentication Design & Management 1 Day Masterclass or7 Hours Self Paced Video The Why:  To provide a virtual workshop for industry leaders, practitioners and consultants looking to develop authentication systems for both B2E, B2C and IoT/Machine ecosystems. For Who:  Your Current Role: Information leader, CISO, identity architect, security architect, CIO, digital consultant Pre-Reqs: Infrastructure understanding, digital concepts, […]
Based on the Amazon Book The CIAM Market and Technology overview course is based on the best selling book “Consumer Identity & Access Management: Design Fundamentals”. Released 2021 A business focused Industry first book on consumer identity Kindle & Paperback Digital copy available for free when buying course Purchase on Amazon Consumer Identity & Access […]