In this issue: Leaders Guide to IAM; AM Poll; Review for Charity
The Optimal Brief | May 2020
IAM Leaders' Guide to Access Management

“IAM leaders focused on core AM tools should refer to the Gartner research mentioned here to understand the broadened scope, deployment approaches and adoption trends of AM tools.” Security and risk management leaders focused on IAM need to assess AM tool scope and deployment approaches and apply continuous adaptive risk and trust assessment approaches to AM.

“The bigger picture of an IAM program scope includes four main functional areas: administration, authorization, assurance and analytics. The AM discipline provides authorization, assurance and analytics capabilities, along with some administrative capabilities as well. It is responsible for the establishment and coordination of runtime access decisions on target systems in line with the other core AM functions.”
Quick Poll - IAM Functional Areas
Which functional area of IAM is most challenging for your organization?
Last month's poll: Do you feel cloud based identity is more manageable than an on-prem solution?
71% agreed / 29% disagreed
Do A Review For Charity
Earn $25 for a charity of your choice by submitting a review of the OptimalCloud or Optimal Federation and Identity Services (OFIS) through Gartner Peer Insights. Thank you in advance for your support!
Now Available:
I.T.'s Secret Weapon -
The Virtual Directory

Webinar Recording -  View Here
Whitepaper -  Download Here

A virtual directory server is a complex and advanced concept that is not well understood outside of the circles where it is used. But in this presentation, we will show why it could be the single most flexible and powerful software component you can add to improve the administration and operation of your enterprise directory services.
Stay At Home Reading Material
Featured IAM Solutions

A complete Identity as a Service (IDaaS) federated broker
  • Private Dedicated Cloud
  • SSO to Applications
  • Delegated Administration
  • Affordable Monthly Plans
  • Request a FREE TRIAL!
A hosted RESTful web service that provides the ability to perform various authentications including single and multi-factor authentication (MFA).

Benefits include:
  • Security and Control
  • Compliance
  • Efficient Deployment
  • Reduced Costs