IAM – Who has access to what information?By Iranna Hurakadli On 2 Mar 2015
An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
How is Security of the Data, Scalability and Availability Ensured in SaaSBy Iranna Hurakadli On 12 Dec 2014
SaaS - Do you have the 3 dimensional superpower yet? SaaS as we know it, powers enterprises worldwide with a host of benefits - entrepreneurial, economical and operational. While reduced time, lower costs, auto upgrades, ease of use and proof...
Privilege Account Management – Keeping Business in the Right HandsBy Iranna Hurakadli On 17 Nov 2014
Organisations have different divisions for carrying out various processes, each headed by a lead who makes decisions and takes calls during crisis. Thus, there’s nothing out of the ordinary about businesses granting privilege rights to specific account holders to ensure...
ACCESS GOVERNANCE – The Phrase to go by to achieve Continuous ComplianceBy Iranna Hurakadli On 17 Nov 2014
Access governance is a security solution that has been gaining attention across enterprises globally for better visibility and vigilance of user access into business applications and associated infrastructure components. With expanding organizational boundaries as enterprises grow in size and complexity...
4 Testaments for Data ProtectionBy Iranna Hurakadli On 7 Nov 2014
‘Data’ is the only common currency that makes the world go around, be it science, technology, finance, defense, communication, medicine, you name it. The advent of this decade has made it so indispensable that there has never been such a...
These blogs might interest you
by Deepti Moolya on 28 Jun 2022
by Sundar Ramaswamy on 2 Jun 2022
by Adarsh BU on 25 May 2022
by Chamale Shettar on 28 Apr 2022
Subscribe for blog updates