Understanding Access Governance: Its Benefits and ChallengesBy Prasenjit saha On 8 Jun 2016
Access Governance is the process of monitoring and controlling who within your organization has access to what, when and how. However, this is easier defined than done. It is easy to confuse access governance with access management, when, in fact,...
The Rise of Cloud-based Managed Security ServicesBy Prasenjit saha On 28 Mar 2016
Cyber security is a massive issue in today's digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are...
Identity and Access Management Tips For Security ProfessionalsBy Prasenjit saha On 24 Mar 2016
The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
Best Security Practices in IT Infrastructure ImplementationBy Prasenjit saha On 18 Feb 2016
The structure of IT infrastructure is changing and with it, its security aspects. Gartner in its ‘Top Predictions for IT Organizations and Users for 2016 and Beyond’  reveals, ‘By 2018, 50 percent of enterprises with more than 1,000 users...
IMS Automation: Things To Keep In MindBy Prasenjit saha On 19 Jan 2016
IT infrastructure forms the bedrock of an enterprise. The demands placed on the IMS (Infrastructure Management and Security) team are many—to maintain the optimal level for service on a daily basis, reduce disruptions to avoid critical system failures and to...
These blogs might interest you
by Mouna Ramesh on 28 Aug 2019
by Subramanya Ajjampur on 2 Aug 2019
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
Subscribe for blog updates