Category Archives: Simplify IAM

What you need to know about IAM System Migration

Successful IAM System Migration

“If you have to decide for a new house – Would it look exactly like your current home?”

Replacement of IAM legacy systemsThe question of system migration is a boon companion for IAM customers. Over the years, some established solutions like BMC’s Control-SA and SUN’s Identity Manager had to leave the market for various reasons. For existing customers of such systems, the replacement of their current installation is becoming a compelling need for the near future. With regards to this enterprise, several vendors are advertising and promising a smooth migration from the existing legacy solution to their platforms.

They argue, that certain tools will help to automatically convert and migrate existing data configurations to the new environment. But to tell the truth, an IAM system migration is a comparable effort like moving a home. To stay in this picture: Would it be really a big advantage for you, if the mover could place your furniture in the new home without instructions, because the old ground plot could be used for the new destination?

Tags:
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Mapping IAM to the Cloud: What you need to consider

Mapping IAM to the Cloud: IAM is growing beyond the premises / Cloud

Identity and Access Management in the Cloud

Identity and Access Management in the Cloud

Although the term ‘Global Village’ is already celebrating its 53rd birthday this year (according to Wikipedia, it was introduced by Marshall McLuhan in his books “The Gutenberg Galaxy: The Making of Typographic Man in 1962)” it has never been more prevailing: Looking to a typical company setup today, everything seems globally interwoven – teams, processes, IT-systems. As one of the consequences IAM systems are challenged to consider and cover this flexibility in its concepts.

The biggest attention in this structural change is probably given to the idea of Cloud Computing.

Tags: | |
Niels von der Hude
Born in 1968, he received his diploma in electronic engineering at TechnischeUnversität Berlin in 1993. In 2000, Niels von der Hude passed the 'General Management Programme' at INSEAD. After ten years of work in telecommuncation business, where he acted as a management consultant and as a corporate investment manager, Niels von der Hude entered Beta Systems in 2003.

Measurable IAM Benefits – Part 3: IAM Cost Calculation

The costs of Identity and Access Management

IAM Portfolio

Beta Systems’ IAM Offering

After looking at the most important benefits of Identity and Access Management and the increased security levels you can achieve with Identity and Access Management and its strategic benefits to the enterprise I will now look in part (3) of my little blog series on “Measurable IAM benefits – an infrastructure task” at the costs of identity and access management in more detail e.g. software licenses, maintenance, implementation and operating costs. How do you do an IAM cost calculation?

Tags: |
Dr. Axel Kern
Senior Manager Consulting Dr. Axel Kern has been in management positions with Beta Systems for more than 20 years, with a high level of experience in Development, Portfolio & Solution Management, and Consulting. Graduating and getting a PhD degree at one of the leading German Technology Universities in Braunschweig he brings an exceptional background and knowledge of IAM solutions and their practical use with him. His deep knowledge of the IAM industry gives value to any project. He combines the ability to lead his team members and to prepare his customers at the same time in the right way to achieve excellent project results.

How to avoid IAM pitfalls

9 pitfalls to avoid when implementing an IAM solution

Chances are, your organization already has a plan and a collection of solutions for the complex issues surrounding Identity Access Management and Governance (IAM). But the real trick is figuring out how to avoid IAM pitfalls that have challenged even the most talented organizations in the implementation process. Here are the 9 major IAM pitfalls to avoid:

Tags: |
Ginny Turley
Ginny Turley is a seasoned Marketing professional with experience in product management, product marketing and brand management. She works hard to communicate and inform the market and thrives on delighting customers while exceeding expectations.