Access Governance
-
Transforming From Traditional IAM to Business Driven IAG
By Jagadeesh CV On 18 Feb 2016Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
-
Network Security: A Key Imperative
By Raghuram Gorur On 20 Jan 2016Network security refers to the set of activities or measures taken to protect your office/ company network and ensure network threat management and remediation. Network security ensures that a network is protected while sending, receiving and storing data and identifies...
Access Governance Cyber Security Infrastructure Security Threat Management
-
Components of Agile Infrastructure
By Raghuram Gorur On 20 Jan 2016The debate on whether the Agile principles that have been making waves in software development can be applied to infrastructure continues even as enterprises adopt and reap the benefits of implementing Agile methodologies to boost their infrastructure. Though the inherent...
-
Identity Management: Best Practices
By Sandip Gupta On 16 Sep 2015With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses...
-
Access Governance: What it is and Why you Need it
By Subhash Nukala On 11 Sep 2015Access governance, as the phrase suggests, refers to the governance or control of who has permission to access what in an organization. Any organization grants access to different employees, based on their designation/role/need; and this process demands comprehensive governance. Why...
Tag Cloud
Subscribe for blog updates