Put These Techniques to Work

Selecting technology vendors can be tricky. Vendor agnostic consulting firms like Identropy help clients design a vendor selection framework that balances quantitative and qualitative techniques to optimize the vendor selection process. This process can be used for either internal or external IAM projects or really, any kind of software project.

Join us live with speaker Jim McDonald, Senior Strategist at Identropy, for our webinar: Making a Confident IAM Technology Decision. You'll gain insights about our vendor selection methodology so you can start to put some of these tried and tested techniques to work for your organization.

During this webinar, you'll learn about:

  • Developing requirements from a technical and business perspective
  • Establishing a vendor short-list
  • Creating a scorecard
  • Making a final selection (and a back-up selection)

There will be a recording available if you aren't able to join! Simply register by filling out the form on this page. 

Jim McDonald
Senior Strategist, Identropy

Jim_McDonald.jpg Jim is an experienced information technology professional with more than ten years of experience in Identity and Access management. He brings to bear a history of deploying strategic solutions to solve real-world business problems.

Prior to joining Identropy, Jim led the IAM Program at Ally Financial (formerly GMAC). While at Ally, Jim oversaw the enterprise identity management implementation and deployed the organization's first IAM Center of Excellence.

Before entering the financial industry, Jim spent nearly 10 years in the manufacturing industry. As an employee of Ingersoll Rand in 2008, Jim assumed the role of IT lead for the Utility Equipment business. After the sale of Bobcat to Doosan Infracore, Jim became the company's first PMO Director.

While at Ingersoll Rand, Jim deployed a robust identity-driven dealer portal, simplifying the relationship between Bobcat and its dealer network. For this effort, Jim was invited to speak at several identity management conferences and was honored as Oracle Magazine's 2006 Security Architect of the Year.