In-depth articles about IAM.
In-depth knowledge sharing
Knowledge sharing is a key value for us, to ensure that as many organizations as possible set up their Identity and Access Management in such a way that it contributes to achieving their business objectives. Such as improving operational activities, strengthening information security and enabling cross-chain information sharing. On this page you will find what we believe to be the most relevant publications that go deeper into our field. Selected by absolute top experts in the field for anyone who wants to gain more in-depth knowledge about Identity and Access management and related topics.
Strategic alignment and access governance
Strategic alignment and access governance In today’s digital age, for an organization to succeed, it must have a strong IT function. That IT function will not be at its [...]
Digital Identity and the Impact it has on Society (and Human Live)
Digital Identity and the Impact it has on Society (and Human Live) Identity and Access Management is not just an area within a company where it is decided [...]
Attribute Quality Management for Dynamic Identity and Access Management
Attribute Quality Management for Dynamic Identity and Access Management Identity and access management (IAM) has become one main challenge for companies over the last decade. Most of [...]
Identifying stakeholders in access governance
Identifying stakeholders in access governance In our view, information security is managing who can have access to what. IAM, Identity and Access Management, is often seen as the [...]