In the first blog in this series, I talked about how to build a business case for implementing a new Identity and Access Management (IAM) solution, though the principles involved are general ones that can be applied to any technology purchasing or services procurement decision.
Here, I’ll take a deeper dive into one of the five steps in building a…