NetWeaver IdM Blog Redirected

To simplify things I have consolidated the Risk Horizon Blog and NetWeaver Blog together.  NetWeaver clicks will redirect to Risk Horizon.  Now I need to fix the authorship since the import mapped all the articles to me.

NetWeaver IdM Blog Redirected

To simplify things I have consolidated the Risk Horizon Blog and NetWeaver Blog together.  NetWeaver clicks will redirect to Risk Horizon.  Now I need to fix the authorship since the import mapped all the articles to me.

IdM & Security Failure

Stories like these make an infosec professional cringe. It could have just as easily been a story of espionage.  No point in over-analyzing it;  the failures are obvious and just because it happened in 1993 doesn’t mean it’s not possible

IdM & Security Failure

Stories like these make an infosec professional cringe. It could have just as easily been a story of espionage.  No point in over-analyzing it;  the failures are obvious and just because it happened in 1993 doesn’t mean it’s not possible

IT Architectural Principles?

If you survey the information on the web concerning IT architectural principles you mostly find descriptions like this.  This is pretty consistent what others have published whether IBM, Gartner, Forrester et. al. After some explanations, they go on to list

IT Architectural Principles?

If you survey the information on the web concerning IT architectural principles you mostly find descriptions like this.  This is pretty consistent what others have published whether IBM, Gartner, Forrester et. al. After some explanations, they go on to list

XAMCL? No Thanks

XAMCL? No Thanks That there are no new problems seems widely understood (save for the child and naïf) but it seems rarely do people bother to understand the historical solutions to these problems, that is to say, we focus almost

XAMCL? No Thanks

XAMCL? No Thanks That there are no new problems seems widely understood (save for the child and naïf) but it seems rarely do people bother to understand the historical solutions to these problems, that is to say, we focus almost

NetWeaver Identity Management 7.1 Implementation Challenges

Challenge 1:  Self Service is Not Intuitive for Unsophisticated Users Companies deploying NetWeaver Identity Management will find that that the interface for self service for the least technical employees will require training.   Clicking a self service task to request a

NetWeaver Identity Management 7.1 Implementation Challenges

Challenge 1:  Self Service is Not Intuitive for Unsophisticated Users Companies deploying NetWeaver Identity Management will find that that the interface for self service for the least technical employees will require training.   Clicking a self service task to request a

Identity Management Business Case Part II

I have previously posted a straight forward method for creating an identity management business case and based on the downloads I have had it’s been popular.  I also know it’s effective because it’s been proven.    Most people shy away from

Identity Management Business Case Part II

I have previously posted a straight forward method for creating an identity management business case and based on the downloads I have had it’s been popular.  I also know it’s effective because it’s been proven.    Most people shy away from

Netweaver IdM Connector Development Kit

In the middle of September SAP began its push for certified solutions to increase the number of connectors for NW IdM.  This is the latest “integration scenario.”  Sometimes I think that SAP sets the standard for clunky phrases and naming

Netweaver IdM Connector Development Kit

In the middle of September SAP began its push for certified solutions to increase the number of connectors for NW IdM.  This is the latest “integration scenario.”  Sometimes I think that SAP sets the standard for clunky phrases and naming

SailPoint Overview Part II

SailPoint began their product with a governance model instead of starting with provisioning.  I think this gives the product a distinct advantage.  Rather being focused entirely on a select group of technical employees and making their lives easier, they instead

SailPoint Overview Part II

SailPoint began their product with a governance model instead of starting with provisioning.  I think this gives the product a distinct advantage.  Rather being focused entirely on a select group of technical employees and making their lives easier, they instead

New Home for Enterprise Risk Management Posts

With the risk intelligence blog in limbo. I have decided to post my enterprise risk management topics here.

New Home for Enterprise Risk Management Posts

With the risk intelligence blog in limbo. I have decided to post my enterprise risk management topics here.

SailPoint IdentityIQ Quick Overview

I had the opportunity courtesy of CTI to train on the SailPoint IdentityIQ product.  I was impressed with the thoroughness of the product.  They are not narrowly focused but offer the  means of nailing down your application identity certifications while

SailPoint IdentityIQ Quick Overview

I had the opportunity courtesy of CTI to train on the SailPoint IdentityIQ product.  I was impressed with the thoroughness of the product.  They are not narrowly focused but offer the  means of nailing down your application identity certifications while