Tag: user provisioning

The Secret Sauce to User Provisioning

If you want the secret to user provisioning and de-provisioning in an enterprise setting, I’ll give you the one word answer, and then you can get on with the rest of your day… Integration. However, if you need to know why, how and with what…read on. The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper rights in…and all others out. Complicating matters is that there are so many users these days…employees, channel

Synchronization enforces control for cloud integrated IDaaS and Access Management (SSO)

When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a certain age and watched films from in science class and the guy in the lab coat was speaking but his words would burble out a second of two later. Not only is this synch off, but the power of the message of symbiosis is gone too. And in cloud

Brass tacks: answering the cloud security questions that matter

Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives. But when we get down to the nitty gritty (the brass tacks if you will), cloud security can be simplified by six simple questions: WHO is logging in? WHAT are they accessing/viewing? WHERE is the device from which that person logs in? WHEN was any asset changed/modified/moved HOW are they authorized/credentialed? WHAT is the impact of the event? Now determining the answers to