about dotnext

The Identity Experts

Key Elements
Services

What we do

professional services

we deliver results

advisory services

Helping you be successful

Vendor Advisory

product strategy advice

Training

we share our knowledge

managed services

value based offerings

VC/PE Advisory

technical due diligence

How it works
our process

we care about your success

Step 01.

We Assess

We assess where you are

Whether you are where you want to be, or some way off. we understand you and what will make you successful.

Step 02.

we Advise

We advise how to get where you want

Our focus is on doing more with less and consolidation where possible.

Step 03.

We deliver

Time to deliver

We deliver on our promises and ensure that you are successful.

Why choose us
services

why work with us?

We understand identity

We are truly experts and have built some of the tools you may use today

We want you to be successful

Our job is to make you successful. Our success will come after.

We save you time

we have worked on thousands of programs, and have templates to speed up yours

We don't drink the Kool-aid

We have worked for major vendors in this space and can cut through marketecture quicker than most

we are agnostic

We will recommend what's right for you. Not who we may partner with

we save you money

We have cost effective packages and look to consolidate or use existing tech where possible

BLOG
From our blog

Latest Post and Articles

Identifying user personas is a simple iterative process in which questions are asked to find differences between groups of users that may cause a different user experience or cause special handling. What that difference is, does not matter and is the importance is only decided upon once applied to a project.
Identity projects and products are very mature and therefore it is very easy to be lulled into the assumption that a product will meet all the requirements for an organisation. Only during installation and configuration it is realised that a product or solution will not solve all the issues. At this stage it is complicated and expensive to correct the issues.
Whilst the exact cause of the hacks has not been released officially, there are a number of clues from press releases that hint at the causes. Unfortunately, it is the same old, same old. Hackers took advantage of long known about weaknesses and ones that can be easily addressed. They were poor leavers process, too high a privilege for internal users and finally poor shared security model.
Contact
Let's talk

Contact Us

contact us to see how we can help you elevate your identity program