We just raised a $30M Series A: Read our story
Identity and Access Management as a Service (IDaaS) (IAMaaS) Questions
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Sep 29 2021
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile? (more)

Hi community,

Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use?

Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?

(less)
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
CaseyWhitcherI think in your initial interview, and evaluation with the client, the necessity… more »
Jay BretzmannWhat's the issue, expense?  How does one eliminate risk if they can't positively… more »
Shibu Babuchandran
Regional Manager/ Service Delivery at ASPL Info Services
Sep 19 2021

Hi all,

What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.

Thanks for sharing your experience!

Evgeny BelenkyHi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John… more »
Peter Lindroth
Infrastructure Architect at Forefront consulting

I'm researching identity management/identity and access management solutions. Are there any good comparison matrices comparing Microsoft Identity Manager to other identity and access management solutions?

Thanks in advance,

Peter

Rony_Sklar
IT Central Station
May 19 2021

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
Ahmad ZuhdiAbsolutely! IAM is so important to prevent a data breach. With IAM we can make… more »
SteveAndrewsSince cybercrime is on the aggressive rise, and our organizations working… more »
Rony_Sklar
IT Central Station
Jun 16 2021

What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?

AdrianMacheI would go for RSA SecurID Suite due to strong compliance and continuous fast… more »
Michel TimpI would recommend Okta or HelloID (which includes Account provisioning , Acces… more »
Rony_Sklar
IT Central Station
Aug 25 2021

SSO seems like a great way to simplify secure user authentication, but is it safe? If SSO is compromised, surely this poses a greater risk, as then all one's passwords can be accessed across all applications? 

Tom AafloenHi all! I do not see SSO purely as authentication. SSO is rather the… more »
José Luis PozoSSO is one of the most secure ways to authenticate a user. However, as usual, it… more »
Arun Kumar VHi,  Single Sign-On for an application is the most secure way of transition… more »