Advise | Architect | Implement


Job Opportunities

Empower your career!

About Everett

From her vision, knowledge and experience, Everett leads in designing, implementing and supporting Identity Solutions that are fit for purpose.


We consult, architect, implement and support your Identity Solutions.


Everett has been adding value to a wide variety of clients in specific market segments for over 15 years now.

Current openings

Check out www.werkenbijeverett.nl

Everett Blog

Our involvement

The identity gateway learns who is using what accounts

It is common in many organizations: not knowing who is using that business-critical system. Sure, one knows that someone logs in with a registered account. But more difficult to know – yet, much more interesting – is who is controlling that account. It might be the executive manager but it might just as well be […]

Biometric authentication – a practical analysis

In my previous post I discussed the philosophical question “Should we want it”, which I kept independent of  technology. The conclusion was as always “It depends”, but the requirements that justify biometric authentication are very specific and do not occur very often in my opinion. In this post I will look at current technologies and […]

Fenyox S.r.l. merges with Everett

I am happy to announce today that Fenyox S.r.l., a consulting company specialized in Identity and Access Governancy (IAG) and located in Rome, Italy, has agreed to merge its activities with Everett. Fenyox provides in-depth system integration and support services regarding portal, identity management and application integration solutions in Italy with a growing focus on […]

Powerful questions

Asking questions is an important part of the daily work of a consultant. Powerful questions are provocative queries that put a halt to evasion and confusion. The contradiction is that most powerful questions seem ‘dumb’. Questions like: “What outcome do you want?” or “What’s the next step?” are very obvious and often give consultants the […]

Biometric authentication – Should we want it?

Introduction There are many aspects of biometric authentication that we can evaluate; ethical, functional, practical and technical or on a more specific level we can look at aspects such as privacy, usability, transferability and legal. Wikipedia actually offers a very decent account. For each of these angles you can ask the philosophical question: “Should we […]

Data Access Governance infographic

Application access is usually granted and governed through role based access. However, a big part of every company’s data resides on file shares and collaboration platforms like SharePoint. Do you know who has access to this so-called unstructured data? Do you understand where the risks are? Data access governance helps you with this and RSA […]

IdentityIQ 6.3 Hands On

In my previous post, I said I hoped to show some of the news features of IdentityIQ 6.3 with some hands on experience. Due to work and holidays, I didn’t have time to do so. In the meantime, SailPoint have released the first patch for 6.3, solving a few issues. Mobile Experience In 6.2 the […]

Kom werken bij Everett!

Beste architect, engineer of adviseur, kom bij ons werken! Neem contact met ons op en kom eens praten. Wie weet pas jij bij ons en biedt Everett je datgene waar jij heel blij van wordt.   Een duidelijke oproep lijkt me zo. De marktvraag voor de diensten die Everett verleent, is groot en groeiende. Een […]

NetIQ Self-Service Password Reset 3.1

Although it has been released several months ago, i would like to point out that NetIQ has released version 3.1 of the Self-Service Password Reset (SSPR) tool. SSPR can be used in an LDAP directory environment (including Active Directory) for password reset functionality. Combined with the Client Login Extensions it will enable the user to […]

NetIQ Access Review 1.0 for Identity Manager

NetIQ just released a new product in their existing extensive line of Identity & Access Management and Access Governance products. This new product is called ‘NetIQ Access Review 1.0 for Identity Manager’ and it enables an organization to review and certify user access to applications and data Many organizations conduct access reviews infrequently if at […]

Call to Action

We would be pleased to provide you with additional information. Please select the link below to go to our contact request page.

Company details

Wiersedreef 5-7
3433 ZX Nieuwegein
P.O. Box 1487
3430 BL Nieuwegein


+31 (0) 30 659 2255

KVK 3022 2874
BTW NL8191.59.955.B01