Consumer Identity Management – 10 Key Things You Need To KnowBy Subhash Nukala On 25 Nov 2016
Consumer Identity Management (CIM) or Consumer Identity and Access Management (CIAM) is slowly becoming the core of modern Business because it allows businesses to create a single view of the customer, independent of how many systems are present. This single...
Choosing the best IAM Suite for your Organization: Criteria ChecklistBy Subhash Nukala On 27 Oct 2015
An Identity and Access Management solution (IAM) can make or break your organization’s security posture. There is no one ‘right’ solution since the solution that you choose will depend on any number of factors: the size of your organization (will...
Access Governance: What it is and Why you Need itBy Subhash Nukala On 11 Sep 2015
Access governance, as the phrase suggests, refers to the governance or control of who has permission to access what in an organization. Any organization grants access to different employees, based on their designation/role/need; and this process demands comprehensive governance. Why...
IoT by ExampleBy Subhash Nukala On 22 Apr 2015
B. K. Yoon, Samsung's co-CEO took to the stage at CES 2015 to declare that all Samsung's products will be Internet-of-Things (IoT) enabled within five years. That being said, what is more interesting is that he said that 90% of...
Internet of Things – Security: What, Why and HowBy Subhash Nukala On 31 Mar 2015
By definition Internet of Things (IoT) is: A proposed development of the internet in which everyday objects have network connectivity, allowing them to send and receive data. Telephones, automobiles, refrigerators and seemingly anything that can host a computer chip are...
These blogs might interest you
by Chetan Deshpande on 20 Aug 2018
by Sharon Andrew on 17 Aug 2018
by Sangram Sawant on 25 Jul 2018
by Rajiv Peddada on 22 May 2018
Subscribe for blog updates