Homan Farahmand

Homan Farahmand

Sr Director Analyst
Homan Farahmand is a Senior Director Analyst within Gartner for Technical Professionals (GTP) covering digital identity and access management (IAM) modernization and emerging technologies adoption including decentralized web and blockchain platforms/protocols.
Read More Read Less
Thursday, 12 March, 2020 10:30 AM|Thursday, 12 March, 2020 11:15 AM
Ask the Expert: Preparing for Future IGA Technologies

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Thursday, 12 March, 2020 01:45 PM|Thursday, 12 March, 2020 02:30 PM
Ask the Expert: Modern Authorization Solutions

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Friday, 13 March, 2020 08:00 AM|Friday, 13 March, 2020 08:45 AM
Evaluation Criteria for PAM Requirements and Vendor Offerings

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Friday, 13 March, 2020 11:00 AM|Friday, 13 March, 2020 11:45 AM
Guidance for Decentralized Identity Adoption

In this session, we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Meet the experts face to face.