2017 is a year of changes: a new four-year cycle, a new US President, and a new Magic Quadrant. Congratulations to Gartner with breaking from previous trends shown the during second term of the Obama administration for releasing MQ later and later every year. This time, surprisingly, the report came one week earlier than in 2016, which corresponded to my prediction in last year’s analysis.
This time, Gartner was able to beat last year’s delay: the results of their 2015 research became available in… March 2016. The “Magic Quadrant for Identity, Governance and Administration” is dated February 29, which is some kind of a record: you cannot release it later if you want to stay with winter months. And the next three reports will be released earlier for sure, just because the next February 29 will be in 2020.
Two weeks ago, I attended an annual Gartner Identity and Access Management Summit in Las Vegas. For veteran attendees, the summit presents the possibility to compare it with the previous years—to see what has changed, what new ideas analysts present, what new vendors show up and what vendors did not. Read more Gartner IAM Summit: Surprises and Trends
Why Costidity is Important to C-Level Management
We are certain the subject of Costidity is of relevant interest to IT Security and Identity, Governance and Administration practitioners. But at the same time, we know that these practitioners need support from C-level management and executives to get anything done and manage Costidity. Support comes from personal interest though, so it’s important to know what each C-level manager can gain from implementing Costidity management. Read more C-Level Management and Costidity
Why Managing Risk in IT Security and IGA Isn’t Enough
When we started talking about the cost of the human factor, i.e. Costidity, people began asking me, “Why are we creating another dimension for assessing governance elements, like business policies and processes? Everybody is doing risk management. And risk already includes the human factor, in particular, the ability to lose the information by emailing it to the wrong person.” Read more Costidity & Risk in IT Security and IGA: A Comparison
Why do IT security and IGA policy makers and managers have different perceptions of reality than the policy constituents? In our opinions, it’s all about intentions and motivations. Read more Are Differences in Intentions and Motivations Increasing Policy Deviations?
IGA was born of this fact: if people need rights to do their jobs, then companies need a system to manage those rights. At first, “system” was a target word and people built tool-centric solutions that were then run by techies. Then “rights” became a focus word when business started to realize the benefits of governance. Read more Costidity: The Cost of the Human Factor