We changed our name from IT Central Station: Here's why

EVOLVEUM midPoint Questions

Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)

Hi Everyone,

What do you like most about EVOLVEUM midPoint?

Thanks for sharing your thoughts with the community!

1 Answer
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

1 Answer
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)

Please share with the community what you think needs improvement with EVOLVEUM midPoint.

What are its weaknesses? What would you like to see changed in a future version?

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

If you were talking to someone whose organization is considering EVOLVEUM midPoint, what would you say?

How would you rate it and why? Any other tips or advice?

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

Hi Everyone,

What do you like most about EVOLVEUM midPoint?

Thanks for sharing your thoughts with the community!

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

Please share with the community what you think needs improvement with EVOLVEUM midPoint.

What are its weaknesses? What would you like to see changed in a future version?

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

1 Answer
Miriam Tover
Content Specialist
PeerSpot (formerly IT Central Station)

If you were talking to someone whose organization is considering EVOLVEUM midPoint, what would you say?

How would you rate it and why? Any other tips or advice?

1 Answer
Identity Management (IM) Questions
User at Jkumar infra
Dec 21 2021

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
Bruce MacdonaldIDAM stands for Identity and Access Management. Think of this as the lifecycle… more »
2 Answers
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jan 12 2022

Hi community,

How do you practically use it and apply Security Posture/Security Posture Management in a large organization?

Tnx.

reviewer1572348Security posture will include a number of things. The following artifacts… more »
1 Answer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Dec 09 2021

When should an organization use Hybrid Identity? What are the top IAM tools that support it?

1 Answer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Nov 29 2021

What is it and how can you practically use it in your organization? 

Shibu BabuchandranHi @Evgeny Belenky ​, Cognitive security can be interpreted as the application… more »
1 Answer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Dec 02 2021

Which modern tools would you recommend using to prevent this type of attack?

3 Answers
Ram Chenna
Enterprise Architect at Blueray Digital Services
Dec 17 2021
Hello everyone, We are working with an energy and utility client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such a...
Read More »
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
John Johny Restrepo HernándezOf course, to have the best Identity and Access Management solution it is… more »
Matt Thomson@Ram Chenna ​ Sounds like there is a lot of things at play here.  I would… more »
11 Answers
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Nov 29 2021
Hi security professionals, As the majority of you have probably heard, GoDaddy has been hacked again a few days ago. Based on what is already known, what has been done wrong and what can be done better?  Share your thoughts!
Read More »
1 Answer
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Sep 29 2021
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
Read More »
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
CaseyWhitcherI think in your initial interview, and evaluation with the client, the necessity… more »
Jay BretzmannWhat's the issue, expense?  How does one eliminate risk if they can't positively… more »
5 Answers
Shibu Babuchandran
Regional Manager/ Service Delivery at ASPL Info Services
Sep 19 2021

Hi all,

What tools do you use to make your remote work efficient? Providing use cases along with the pros & cons of the tools would also be beneficial for the community.

Thanks for sharing your experience!

Evgeny BelenkyHi @Chetan Woodun, @Felician (Felix)Farcutiu, @SIVASHANMUGAM NATARAJAN, @John… more »
1 Answer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Oct 05 2021
Hi peers, In my opinion, it's very important for your enterprise firewall/NGFW to support ID-based rules.  What products do provide this feature? What kind of identity-based rules are supported by them? Thanks.
Read More »
Manuel BrionesWe use Check Point for this solution through the Identity Awareness blade where… more »
2 Answers
Juma Alshehhi
System Administrator at MOI
Jul 26 2021

I am researching identity management solutions. Who in the team should be managing the IDM product?

Hasan Zuberi ( HZ )Depends on the Level of organizations. There are teams sometimes specifically… more »
Joakim ThorénTypically we see IDM products being managed by a system owner in the security… more »
Jay BretzmannIt also depends upon what capabilities are required in your environment. Is the… more »
5 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
Ahmad ZuhdiAbsolutely! IAM is so important to prevent a data breach. With IAM we can make… more »
SteveAndrewsSince cybercrime is on the aggressive rise, and our organizations working… more »
4 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
Nov 01 2021

What tools can be used to help make GDPR compliance easier? What are some specific features to look out for?

AdrianMacheI would go for RSA SecurID Suite due to strong compliance and continuous fast… more »
Michel TimpI would recommend Okta or HelloID (which includes Account provisioning , Acces… more »
Chris FaistRony - Access management is only a small part of GDPR compliance. GDPR is… more »
5 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)
Oct 14 2021

Hi peers,

Can you share your recommendations for the most efficient way to handle the employee identity lifecycle in a secure way? 

Also, any suggestions for the tools to put in place to ease this process?

Thanks!

2 Answers
Rony_Sklar
PeerSpot (formerly IT Central Station)

Why Identity governance and administration are considered so important in enterprise IT management?

How can Identity Management (IM) tools help manage IGA better?

Efrén YanezWhy is identity governance and administration (IGA) important? By definition… more »
Enno HoffmannWhy Identity governance and administration are considered so important in… more »
2 Answers