Posts by John Kimberly
In this role, he assists corporations, governments, and educational institutions resolve challenges that encompass enterprise identity management, elevated privilege management, regulatory compliance, on-premises application access, SaaS IdM SSO access, secure multi-factor authentication, identity management self-service, and mobile device management.
By John Kimberly, October 31, 2016
In the novel Frankenstein, by Mary Shelly, Victor Frankenstein embarks on a quest to create life by using dead body parts, “collected bones from carnel-houses.” In the novel, the monster is totally uncontrollable and ultimately dooms his creator Victor. Frankenstein is not only a masterpiece of literature, but also represents a perfect analogy for today’s highly distributed business, and government, IT enterprises. Within the IT organizations of large enterprises, it’s very common to have different groups operating with almost complete autonomy, like small “kingdoms,” and these groups may rarely, if ever, coordinate their activities. Sure it’s true, that in some activities…