by Gary Zimmerman | Apr 25, 2025
IGA Has Failed—What is the Best Path Forward?247 DownloadsAbstract We start with the premise that Identity Governance and Administration (IGA), touted as the way to answer “Who Has Access to What?” has largely failed to achieve the results most enterprises expected...
by Gary Zimmerman | Apr 17, 2025
Axiomatics Aims for Access Autonomy427 DownloadsAbstract This is the second of a series of reports on specific vendor offerings that enterprises should consider as they modernize their Identity and Access Management (IAM) foundation. In this report, we’ll review...
by Gary Zimmerman | Mar 26, 2025
SGNL Signals a Better Way Forward for Access Control333 DownloadsAbstract This is the first of a series of reports on specific vendor offerings that enterprises should consider as they modernize their Identity and Access Management (IAM) foundation. We’ll start with a...
by Gary Zimmerman | Jan 30, 2025
Know Your Agent: IAM Support for AI218 DownloadsAbstract AI offers game-changing benefits for individuals and enterprises but also exposes organizations to potentially devastating risks. One of the greatest AI-related risks and the focus of this paper is the...
by Gary Zimmerman | Nov 20, 2024
Personhood Credentials: An Emerging Solution to AI Deception259 DownloadsAbstract The rise of AI-generated deception, including deepfakes and synthetic personas, presents significant challenges in maintaining trust and authenticity in digital environments. Personhood...
by Gary Zimmerman | Oct 25, 2024
Know Your Worker (KYW): The Intersection of Worker Risk and IAM245 DownloadsAbstract After more than 10,000 years of human existence in an analog environment, we must all adjust to a digital world where we are prone to myriad fraud and theft schemes perpetuated by...
by Gary Zimmerman | Sep 15, 2024
Cloud-based IoT Ecosystems fuel the AI Economy149 DownloadsAbstract Critical to the success of any Artificial Intelligence (AI) program is the systematic collection of the vast quantities of data required to train AI models. Next-generation AI will be fueled by the...
by Gary Zimmerman | Jun 10, 2024
Data-centric Security148 DownloadsAbstract Data-centric security is crucial for protecting sensitive information, ensuring compliance with data privacy regulations, and enabling secure collaboration. Organizations must adopt this approach to safeguard their most...
by Gary Zimmerman | Mar 8, 2024
Developing a Decentralized Identity Reference Architecture148 DownloadsAbstract Centralized Identity and Access Management (IAM) systems and services have been the foundation for digital identity over the past 40 years. Centralized IAM is attractive to enterprises and...
by Gary Zimmerman | Feb 20, 2024
Digital Identity Wallets148 DownloadsAbstract The tech world has been striving to find an approach to the various aspects of the identity problem for several decades. There have been any number of false dawns and many lessons learnt along the way and inevitably there...
Recent Comments