Welcome!

Identity Management Tips, Thoughts and Opinions

Matthew Pollicove

Subscribe to Matthew Pollicove : eMailAlertsEmail Alerts
Get Matthew Pollicove via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Matthew Pollicove

Darmstadt, December 11, 2009 - Multiple login procedures with different user name/password combinations are often productivity-sapping inconvenience for employees. Corporate regulations on password complexity do not provide sufficient security. Users just write down complex passwords instead of memorizing them. Such practices are a great security risk making vital data easily accessible to unauthorized personal. Secure SignOn for Enterprise Single Sign-On (E-SSO) ensures high user acceptance, high user productivity, and efficiency by significantly reducing helpdesk calls and by reducing the time required to login to various business applications. These factors result in a rapid and large Return-on-Investment (ROI) after only a short period of time. About Secure SignOn Secure SignOn provides a comprehensive Enterprise Single Sign-On (E-SSO) solution based on an Activ... (more)

Servers, Energy Consumption & Green IT

Darmstadt, December 22, 2009 - “I live responsibly on this planet. Whether politicians the world over are concerned or not, I am concerned about global climate change. As this is my children’s planet too, I wish to be proactive. At the modest level of my organization, I have launched a Green IT initiative that will reduce energy consumption and CO2 emissions by not less than 30%,” says SECUDE’s CEO and Founder, Dr. Heiner Kromer. Going Green The Copenhagen Summit may not have achieved what was hoped for. However, SECUDE, in its own modest way, has taken the initiative to tackle en... (more)

Identity up in the Cloud

This was a topic that I thought I would really be getting into during 2010, but somehow the Cloud never really seemed to become the story.  On the whole, I think there were more discussions regarding the definition of Identity and the Federation of those identities between systems.  However there's still be some discussion of what the "cloud" actually is and how it should function in various disciplines, including Identity Management. I thought that David Kearns recent article on Avoiding "cloud anguish" an interesting point that I would also like to comment on. "...the “year of” ... (more)

SAP TechEd 2012: Day 1

Day 1, all I can really say is Wow! I attended sessions on the latest addition to the SAP's Identity Management line up, some of it's oldest technology and the future of the NetWeaver IDM.  After today's session, my mind is completely blown away. I started the day with two informative sessions on SAP's Single Sign-on Offering based on the technology asset acquisition from SECUDE about 18 months ago. SAP has clearly recognized that information security must begin at the login and proceed from there.  I'm looking forward to learning more about it over the next year or so.  It's a m... (more)

What comes after IDM?

People often ask me what comes after Identity Management? My answer is that it depends. As I've discussed before, it's really up to what the organization requires and simply tacking on new workflows, approvals, and functionality is only really useful if it will actually be used.  However, I think we can make a few generalizations about what might occur as part of a far reaching and comprehensive IdM program. Assuming that the initial project succeeded in its goal of creating an authoritative data store and basic provisioning, there's always the goal of adding more applications an... (more)