Welcome!

Open Source Cloud Authors: Liz McMillan, Pat Romanski, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Blog Feed Post

An Update on @ForgeRock: This company is quietly transforming the entire stack of enterprise identity management, access control and authorization capabilities

By Bob Gourley

It has been a while since I’ve written about ForgeRock and after getting an update from them to day I’m embarrassed to say I should have been keeping you all more informed. If you are a program manager, systems architect, software engineers or CIO/CTO/CISO you should really be tracking what this very virtuous firm is doing.

For context let me remind you that ForgeRock started as a team of very smart enterprise IT and open source technologists with experience with the open source identity management capabilities from the Sun/Solaris world. Their vision was to enhance support to enterprise customers while continuing to enhance the Open Identity Stack of tools needed by every enterprise.  I first learned about ForgeRock when Scott McNealy gave me a head’s up on the potential very positive difference they could make for any enterprise and have kept them on our “Disruptive IT” list ever since. But as I hinted at above, I dropped synch for a while and have just realized they are not only meeting their initial objectives of enhancing support to open identity, but they have created what may be an entire new market, something we have all wanted but have not been able to articulate.  They are now providing capabilities that enable far more than identity management. They provide IRM, the evolved/improved version of IAM.  IRM, Identity Relationship Management, is now a hot topic thanks to ForgeRock. IRM has technical differentiators over the old IAM, but the biggest differences are in how solutions are designed and applied and the mindset of organizations that take this IRM approach. IAM is about security and protection of who has access to IP and resources. IRM extends that to include enterprise reach securely to enable more trust-based relationships and broader mission-focused partnerships based on trust.

Here is a bit more about ForgeRock and their open source solution and approach from their website:

We deliver a revolutionary approach to identity management through our Open Identity Stack, subscriptions and training.

Our solutions are delivered to you through a simple Open Identity Stack used to build reusable and efficient business processes and controls. Once you download our open source, sign up for a ForgeRock subscription and get access to unlimited personal support, real-time product releases and our active online community.

You can also register for a course at ForgeRock University, our online training program that arms you with the skills you need to execute a smooth deployment plan and become proficient with our Open Identity Stack

For more on ForgeRock see http://ForgeRock.com

 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...