What can we really do about the insider threat?

The “insider” has been indicated as a the most severe security threat for decades. Almost every security study states that the insiders are among the highest risk in almost any organization. Employees, contractors, support engineers – they have straightforward access to the assets, they know the environment and they are in the best position to Read more about What can we really do about the insider threat?[…]

How to Start Up an Open Source Company

Evolveum is a successful open source company now. We develop open source Identity and Access Management (IAM) software. We have legally established Evolveum in 2011 but the origins of Evolveum date back to mid-2000s. In 2014 we are getting out of the startup stage into a sustainable stage. But it was a long way to Read more about How to Start Up an Open Source Company[…]

Project Provisioning with MidPoint

Evolveum midPoint is a very unique Identity Management (IDM) system. MidPoint is a robust open source provisioning solution. Being an open source the midPoint is developed in a fairly rapid, incremental and iterative fashion. And the recent version introduced a capability that allows midPoint to reach beyond the traditional realm of identity management. Of course, Read more about Project Provisioning with MidPoint[…]

The Old IDM Kings Are Dead. Long Live the New Kings.

It can be said that Identity Management (IDM) was born in early 2000s. That was the time when many people realized that a single big directory just won’t do it. They realized that something different was needed to bring order into the identity chaos. That was the dawn of a user provisioning system. Early market Read more about The Old IDM Kings Are Dead. Long Live the New Kings.[…]

Five Practical Ways to Ruin Your IAM Project

Identity and Access Management projects are very common nowadays. The interesting fact is that too many of them either vastly under-deliver or totally fail. I have been fighting in the IAM trenches for many long years and I have seen both successful and failed projects. It looks like to me that the IAM projects are Read more about Five Practical Ways to Ruin Your IAM Project[…]

IDM Antipatterns and Best Practice

All of us know it: ideas that sounds great but they fail miserably. It is a common sight almost everywhere. But during last few months I’ve heard an unusual number of such ideas related to the Identity and Access Management solutions. I know that veteran IAM practitioners are probably already well aware of them, but Read more about IDM Antipatterns and Best Practice[…]

Developing Newton

MidPoint has reached the state of a sophisticated open-source identity provisioning system. It has went through many releases and its provisioning and synchronization capabilities were gradually refined. MidPoint is currently the largest and most sophisticated open source identity provisioning system available on the market. It is as big as its two other competitors combined. And Read more about Developing Newton[…]