GARTNER MAGIC QUADRANT ANALYSIS, IGA 2017

2017 is a year of changes:  a new four-year cycle, a new US President, and a new Magic Quadrant. Congratulations to Gartner with breaking from previous trends shown the during second term of the Obama administration for releasing MQ later and later every year. This time, surprisingly, the report came one week earlier than in 2016, which corresponded to my prediction in last year’s analysis.

Read more GARTNER MAGIC QUADRANT ANALYSIS, IGA 2017

Gartner Identity, Governance and Administration Magic Quadrant 2016 analysis

This time, Gartner was able to beat last year’s delay: the results of their 2015 research became available in… March 2016. The “Magic Quadrant for Identity, Governance and Administration” is dated February 29, which is some kind of a record: you cannot release it later if you want to stay with winter months. And the next three reports will be released earlier for sure, just because the next February 29 will be in 2020.

Read more Gartner Identity, Governance and Administration Magic Quadrant 2016 analysis

C-Level Management and Costidity

Why Costidity is Important to C-Level Management

We are certain the subject of Costidity is of relevant interest to IT Security and Identity, Governance and Administration practitioners. But at the same time, we know that these practitioners need support from C-level management and executives to get anything done and manage Costidity. Support comes from personal interest though, so it’s important to know what each C-level manager can gain from implementing Costidity management. Read more C-Level Management and Costidity

Costidity & Risk in IT Security and IGA: A Comparison

Why Managing Risk in IT Security and IGA Isn’t Enough

When we started talking about the cost of the human factor, i.e. Costidity, people began asking me, “Why are we creating another dimension for assessing governance elements, like business policies and processes? Everybody is doing risk management. And risk already includes the human factor, in particular, the ability to lose the information by emailing it to the wrong person.” Read more Costidity & Risk in IT Security and IGA: A Comparison