We just raised a $30M Series A: Read our story
Identity Management (IM) Questions
Ram Chenna
Enterprise Architect at Blueray Digital Services
Nov 27 2021
Hello everyone, We are working with an energy and utility client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such… (more)

Hello everyone,

We are working with an energy and utility client based in the US.

Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc).

We integrate with a host of external vendor products such as Payment Gateway, eKYC vendors, third-party Aggregators, etc.

We are looking to explore an IAM product tool that fits well within our technology landscape.

Primarily, we would have internal employees authenticating and connecting to a host of applications from the Internet and as well as external vendors, partners also connecting to it.

Currently, we have suggested having an external Domain Controller for external users and a separate Domain Controller - for internal users. This way we can have more granular governance, access, and security policies for external and internal users.

In the future, we might expose the authentication using social media as well (such as GMAIL, LI, FB, etc) for guest users.

Please share your advice about an IAM product/solution that fits our requirements and within the Microsoft Technology stack and landscape.

(less)
Evgeny Belenky
IT Central Station
Nov 24 2021
Hi security professionals, As the majority of you have probably heard, GoDaddy has been hacked again a few days ago. Based on what is already known, what has been done wrong and what can be done better?  Share your thoughts! (more)

Hi security professionals,

As the majority of you have probably heard, GoDaddy has been hacked again a few days ago.

Based on what is already known, what has been done wrong and what can be done better? 

Share your thoughts!

(less)
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Sep 29 2021
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile? (more)

Hi community,

Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use?

Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?

(less)
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
CaseyWhitcherI think in your initial interview, and evaluation with the client, the necessity… more »
Jay BretzmannWhat's the issue, expense?  How does one eliminate risk if they can't positively… more »
Shibu Babuchandran
Regional Manager/ Service Delivery at ASPL Info Services
Sep 19 2021

Hi all,

What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.

Thanks for sharing your experience!

Evgeny BelenkyHi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John… more »
Evgeny Belenky
IT Central Station
Oct 05 2021
Hi peers, In my opinion, it's very important for your enterprise firewall/NGFW to support ID-based rules.  What products do provide this feature? What kind of identity-based rules are supported by them? Thanks. (more)

Hi peers,

In my opinion, it's very important for your enterprise firewall/NGFW to support ID-based rules. 

What products do provide this feature? What kind of identity-based rules are supported by them?

Thanks.

FIrewall ID-based rules
(less)
Manuel BrionesWe use Check Point for this solution through the Identity Awareness blade where… more »
Juma Alshehhi
System Administrator at MOI
Jul 26 2021

I am researching identity management solutions. Who in the team should be managing the IDM product?

Hasan Zuberi ( HZ )Depends on the Level of organizations. There are teams sometimes specifically… more »
Joakim ThorénTypically we see IDM products being managed by a system owner in the security… more »
Jay BretzmannIt also depends upon what capabilities are required in your environment. Is the… more »
Rony_Sklar
IT Central Station

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
Ahmad ZuhdiAbsolutely! IAM is so important to prevent a data breach. With IAM we can make… more »
SteveAndrewsSince cybercrime is on the aggressive rise, and our organizations working… more »
Rony_Sklar
IT Central Station
Nov 01 2021

What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?

AdrianMacheI would go for RSA SecurID Suite due to strong compliance and continuous fast… more »
Michel TimpI would recommend Okta or HelloID (which includes Account provisioning , Acces… more »
Chris FaistRony - Access management is only a small part of GDPR compliance. GDPR is… more »
Rony_Sklar
IT Central Station
Oct 14 2021

Hi peers,

Can you share your recommendations for the most efficient way to handle the employee identity lifecycle in a secure way? 

Also, any suggestions for the tools to put in place to ease this process?

Thanks!

Rony_Sklar
IT Central Station
Jun 01 2021

Why Identity governance and administration are considered so important in enterprise IT management?

How can Identity Management (IM) tools help manage IGA better?

Efrén YanezWhy is identity governance and administration (IGA) important? By definition… more »
Enno HoffmannWhy Identity governance and administration are considered so important in… more »