SailPoint IIQ: The BuildMap Rule Revisited
Well, I’m behind on posting again. Apologies to those following here who I know were looking forward to this particular post which I promised in person to a number of you. Build Map Rules in...
View ArticleSailPoint IIQ: BuildMap – I Told You So :-)
Okay, here’s an article I wasn’t planning on posting, but based on some feedback I received privately via email, I thought I would throw this one example out there. Sometimes the simplest and...
View Article@IdMConsultant for IdM Related Tweets
I’ve been wanting for a while to create a dedicated channel on Twitter for tweeting content specific to Identity & Access Management. As of now, I’ll be doing exactly that via a new @IdMConsultant...
View ArticleTomcat: Open Document Directory Listings
A lot of us IdMers deploy and run our favorite flavors of IdM tools to and on Apache Tomcat in our personal sandboxes. It’s just an easy servlet container to deploy to. Sun Identity Manager/Oracle...
View ArticleSailPoint IIQ: Best Practice – Native Change Detection
This should be a short post. What I want to offer is longer than what I can fit into a tweet (@IdMConsultant), but pretty simple to state. (But since I’m blogging, I will expand slightly… :-))...
View ArticleSailPoint IIQ: Rule And Settings Overrides
One of the primary reasons I write here is to clear up any minor points of confusion with our highly valued Qubera clients, and to enhance their understanding of products we have installed for them...
View ArticleIan Glazer: Killing IdM to Save It
I recently watched Ian Glazer of Gartner‘s presentation on Killing IAM In Order To Save It and whole heartedly agree with a lot of what he advocates in this quick presentation. Enough to feature it...
View ArticleSailPoint IIQ: Aggregating XML
From an answer to a client this morning on aggregating XML in Sailpoint IIQ. I hope this helps others out there: Regarding your question this morning on aggregating XML… I have seen XML aggregated...
View ArticleOh Ye MacBook Pro Of Little Memory :-(
I’ve been a Mac user ever since 1993 and have always been extremely pleased with the platform in so many ways. Recently, Apple seems to have finally been realized in the consumer market as superior — I...
View ArticleSailPoint IIQ: Move Over, Rover
I’m getting ready to do some customer training on Sailpoint IIQ v6.0. Getting ready for the trip has been a good impetus to get my rear end in gear and get up to date. I’ve been running Sailpoint IIQ...
View ArticleStupid SailPoint Developer Tricks
Hello, mates — as they say Down Under, where I happen to be at the moment on a rather large Sailpoint engagement. It’s been a while, and I’m sorry for that. I keep promising more, new and better...
View ArticleSailPoint IIQ: Rule Modeling in Real Java :-)
I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done something like this before — and well… here it is. Tired of No BeanShell...
View ArticleGreat (SailPoint) Work Is Out There!
Today was it. Today was the day I finally broke down and went beyond lamenting that I can’t clone myself. Today was the day I looked in the mirror and called myself a little bit of stupid and a little...
View ArticleData Is The New Gold: Getting Data Security Right in Retail
Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, you know –...
View ArticleHistory Foretells the Raising of the Ante: Securing Your Data Now All but...
It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval arms race to protect the pot of gold inside the castle from...
View ArticleTwo Years Later: Reflections from “The Breach”
President and CEO of Vormetric, Alan Kessler, blogged earlier this week concerning the far-reaching impacts of the Target breach – reflections from almost two years later. Alan remonstrated in his...
View ArticleConsiderations Around Application Encryption
For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that used or generated the data. Early...
View ArticleHistory Demonstrates Strong Encryption Is Here To Stay
(Originally published on LinkedIn – January 13th, 2016) I am a very firm believer that knowing the background and history of things provides a much better forward-looking perspective and present...
View ArticleThe Problem of Non-User IDs in Organizations Today
(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party Contractors: The Target Breach’s...
View ArticleThe Case for “Encrypt Everything”
Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage and apply this technology. Many...
View Article
More Pages to Explore .....