-
Consumer Identity Management – 10 Key Things You Need To Know
By Subhash Nukala On 25 Nov 2016Consumer Identity Management (CIM) or Consumer Identity and Access Management (CIAM) is slowly becoming the core of modern Business because it allows businesses to create a single view of the customer, independent of how many systems are present. This single...
-
Choosing the best IAM Suite for your Organization: Criteria Checklist
By Subhash Nukala On 27 Oct 2015An Identity and Access Management solution (IAM) can make or break your organization’s security posture. There is no one ‘right’ solution since the solution that you choose will depend on any number of factors: the size of your organization (will...
-
Access Governance: What it is and Why you Need it
By Subhash Nukala On 11 Sep 2015Access governance, as the phrase suggests, refers to the governance or control of who has permission to access what in an organization. Any organization grants access to different employees, based on their designation/role/need; and this process demands comprehensive governance. Why...
-
Internet of Things – Security: What, Why and How
By Subhash Nukala On 31 Mar 2015By definition Internet of Things (IoT) is: A proposed development of the internet in which everyday objects have network connectivity, allowing them to send and receive data. Telephones, automobiles, refrigerators and seemingly anything that can host a computer chip are...
Tag Cloud
Subscribe for blog updates