Archive for

IAM

How Recent Changes In Identity Management Help Businesses To Better Secure Their Systems And People

Posted: March 16, 2023
Category: IAM

Organizations have invested considerably in their digital transformation initiatives. Analyst firms estimate hundreds of millions have been earmarked in recent years to move to cloud computing, digitize business processes, and improve customer experiences to stay competitive and relevant. It makes ...

Continue Reading

Identity is Not the New Perimeter!

Posted: March 26, 2021
Category: IAM

A few years ago, we all were bombarded by marketing campaigns from identity management (IDM) software vendors stating that the “Identity is the new Perimeter.” While that sounds good and sells well to CISOs and CIOs, it is a little simplistic and misleading. I believe that identity is just a ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part III

Posted: June 26, 2019
Category: IAM

Hello and welcome back to my blog series on Endpoint Privilege Management.  This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part II

Posted: June 10, 2019
Category: IAM

Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM).  If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...

Continue Reading

Endpoint Privilege Management – Starting a Blog Series

Posted: May 20, 2019
Category: IAM

Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges.  Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...

Continue Reading