IAM – Who has access to what information?By Iranna Hurakadli On 2 Mar 2015
An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
How is Security of the Data, Scalability and Availability Ensured in SaaSBy Iranna Hurakadli On 12 Dec 2014
SaaS - Do you have the 3 dimensional superpower yet? SaaS as we know it, powers enterprises worldwide with a host of benefits - entrepreneurial, economical and operational. While reduced time, lower costs, auto upgrades, ease of use and proof...
Privilege Account Management – Keeping Business in the Right HandsBy Iranna Hurakadli On 17 Nov 2014
Organisations have different divisions for carrying out various processes, each headed by a lead who makes decisions and takes calls during crisis. Thus, there’s nothing out of the ordinary about businesses granting privilege rights to specific account holders to ensure...
ACCESS GOVERNANCE – The Phrase to go by to achieve Continuous ComplianceBy Iranna Hurakadli On 17 Nov 2014
Access governance is a security solution that has been gaining attention across enterprises globally for better visibility and vigilance of user access into business applications and associated infrastructure components. With expanding organizational boundaries as enterprises grow in size and complexity...
4 Testaments for Data ProtectionBy Iranna Hurakadli On 7 Nov 2014
‘Data’ is the only common currency that makes the world go around, be it science, technology, finance, defense, communication, medicine, you name it. The advent of this decade has made it so indispensable that there has never been such a...
These blogs might interest you
by Chetan Deshpande on 20 Aug 2018
by Sharon Andrew on 17 Aug 2018
by Sangram Sawant on 25 Jul 2018
by Rajiv Peddada on 22 May 2018
Subscribe for blog updates