Discussion about this post

User's avatar
Ondřej Urbánek's avatar

Hi Eric, I just came across this article, and even though I've been involved with this story for a while, it's nice to gain some insider context. Thanks!

Since our IAM solutions relied on these open-source products, these turbulences caused us some headaches. However, because we strongly believe in the principles of open source, we founded the Wren Security initiative to preserve the legacy, see https://wrensecurity.org/. Hopefully, this could be one of the alternatives worth considering. Thanks again, Ondrej.

Expand full comment
Michiel H's avatar

Fantastic story. Great insights. One thing though: “and those customers invest heavily to make a solution work for their company”. I don’t think anyone ever bought a solution. The customers bought a tool. A tool they invest in heavily to turn into solution. If there’s one thing my last 23 years in the IAM business have taught me, it’s that there are no of the shelf solutions. It’s how you use the tools you buy. Combined with a talented group of colleagues, best practices and common sense.

Other than that, fantastic insight in the world of takeovers. Thank you!

Expand full comment
5 more comments...

No posts