Kent Purdy

Contact Kent Purdy

Member since
6/27/2008

About Kent Purdy

25 years experience with data center products and technologies, ten of which included working with Identity and Access Management solutions. Have a keen focus on trends relevant to information and application delivery and their enabling effect they have on organizations.

User Points

0 points earned on legacy (former) Cool Solutions site
0 points earned on this site

Author Archives

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

May 29, 2017
10:34 pm
Reads:
522
Score:
Unrated

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

May 7, 2017
10:51 pm
Reads:
404
Score:
Unrated

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Jan 16, 2017
7:25 pm
Reads:
679
Score:
Unrated

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Nov 21, 2016
2:26 pm
Reads:
1,411
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Jun 30, 2016
2:09 am
Reads:
1,668
Score:
5

As organizations respond to the current sea change in the way people work as well as what they use as their office, most organizations still have a ways to go in terms of keeping remote access secure and effective while at the same time reigning in costs. Although most all companies are continuing their shift…

+ read more

Jun 25, 2015
4:37 pm
Reads:
2,021
Score:
Unrated

The old days of user access are gone Taking a least-privileged user approach for access control goes a long way in protecting your organization. But in today’s connected and mobile world, securing access purely from user permission level is not enough. Context needs to play a foundational role for assessing the risk of honoring those…

+ read more

Mar 30, 2015
11:13 am
Reads:
2,112
Score:
4

Have you ever received a survey that you actually wanted to respond to? Not because you wanted to complain, but because it was relevant to something that interested you?” I received a survey this week from my health care provider. Based on the notable amount of transformation they have undergone these last few years I…

+ read more

Feb 10, 2015
10:12 am
Reads:
2,123
Score:
4.5

We’ve all been there. A few times each year IT revisits their shortlist of potential projects to determine what to fund. For many, the list of “to do’s” is longer than their arm, while their budget fits in a shirt pocket. Which inevitably results in prioritizing spend on projects that address risk and compliance first….

+ read more

Oct 22, 2014
4:05 pm
Reads:
15,432
Score:
5