Quantcast
Channel: Chris Olive
Browsing all 23 articles
Browse latest View live

SailPoint IIQ: The BuildMap Rule Revisited

Well, I’m behind on posting again. Apologies to those following here who I know were looking forward to this particular post which I promised in person to a number of you. Build Map Rules in...

View Article



SailPoint IIQ: BuildMap – I Told You So :-)

Okay, here’s an article I wasn’t planning on posting, but based on some feedback I received privately via email, I thought I would throw this one example out there. Sometimes the simplest and...

View Article

@IdMConsultant for IdM Related Tweets

I’ve been wanting for a while to create a dedicated channel on Twitter for tweeting content specific to Identity & Access Management. As of now, I’ll be doing exactly that via a new @IdMConsultant...

View Article

Tomcat: Open Document Directory Listings

A lot of us IdMers deploy and run our favorite flavors of IdM tools to and on Apache Tomcat in our personal sandboxes. It’s just an easy servlet container to deploy to. Sun Identity Manager/Oracle...

View Article

SailPoint IIQ: Best Practice – Native Change Detection

This should be a short post. What I want to offer is longer than what I can fit into a tweet (@IdMConsultant), but pretty simple to state. (But since I’m blogging, I will expand slightly… :-))...

View Article


SailPoint IIQ: Rule And Settings Overrides

One of the primary reasons I write here is to clear up any minor points of confusion with our highly valued Qubera clients, and to enhance their understanding of products we have installed for them...

View Article

Ian Glazer: Killing IdM to Save It

I recently watched Ian Glazer of Gartner‘s presentation on Killing IAM In Order To Save It and whole heartedly agree with a lot of what he advocates in this quick presentation. Enough to feature it...

View Article

SailPoint IIQ: Aggregating XML

From an answer to a client this morning on aggregating XML in Sailpoint IIQ. I hope this helps others out there: Regarding your question this morning on aggregating XML… I have seen XML aggregated...

View Article


Oh Ye MacBook Pro Of Little Memory :-(

I’ve been a Mac user ever since 1993 and have always been extremely pleased with the platform in so many ways. Recently, Apple seems to have finally been realized in the consumer market as superior — I...

View Article


SailPoint IIQ: Move Over, Rover

I’m getting ready to do some customer training on Sailpoint IIQ v6.0. Getting ready for the trip has been a good impetus to get my rear end in gear and get up to date. I’ve been running Sailpoint IIQ...

View Article

Stupid SailPoint Developer Tricks

Hello, mates — as they say Down Under, where I happen to be at the moment on a rather large Sailpoint engagement. It’s been a while, and I’m sorry for that. I keep promising more, new and better...

View Article

SailPoint IIQ: Rule Modeling in Real Java :-)

I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done something like this before — and well… here it is. Tired of No BeanShell...

View Article

Great (SailPoint) Work Is Out There!

Today was it. Today was the day I finally broke down and went beyond lamenting that I can’t clone myself. Today was the day I looked in the mirror and called myself a little bit of stupid and a little...

View Article


Data Is The New Gold: Getting Data Security Right in Retail

Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, you know –...

View Article

History Foretells the Raising of the Ante: Securing Your Data Now All but...

It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval arms race to protect the pot of gold inside the castle from...

View Article


Two Years Later: Reflections from “The Breach”

President and CEO of Vormetric, Alan Kessler, blogged earlier this week concerning the far-reaching impacts of the Target breach – reflections from almost two years later. Alan remonstrated in his...

View Article

Considerations Around Application Encryption

For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that used or generated the data. Early...

View Article


History Demonstrates Strong Encryption Is Here To Stay

(Originally published on LinkedIn – January 13th, 2016) I am a very firm believer that knowing the background and history of things provides a much better forward-looking perspective and present...

View Article

The Problem of Non-User IDs in Organizations Today

(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party Contractors: The Target Breach’s...

View Article

The Case for “Encrypt Everything”

Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage and apply this technology. Many...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images