Blog

We are always listening, learning, thinking and sharing.

IGA
The Pitfalls of Homegrown IGA
Richard Lack - Technology Consultant.

Many organisations start off with a homegrown approach to IGA using a combination of spreadsheets, helpdesk…

Read
IGA
Who needs Identity Governance ?
Umar Qayum - Technology Consultant.

If your organisation has more than a few employees, who use more than a few applications to do their…

Read
Role Based Access Control
Identity Portal overview.

The Identity Portal empowers users across an organisation to manage their access and request additional…

Read
IGA
What is Identity Governance & Administration (IGA)?
Umar Qayum - Technology Consultant.

First, what is an identity? An identity is a digital representation of an individual, recording of all…

Read
RBAC
What is Role Based Access Control (RBAC)?
Richard Lack - Technology Consultant.

Role Based Access Control (RBAC) is commonly used within the Identity Governance and Administration (IGA)…

Read
Blog
Identity Security Self Assessment!

Our partner ProofID has just launched an Identity Security Self Assessment tool.

Read
Blog
Bridging the gap!

Complicated seems clever to stupid people – a framed quote by Dave Trott that was left hanging on the…

Read