Identity & Access Governance
How SCIM can help to solve the case of mistaken identity?By Jageesh KV On 24 Aug 2017
Overview We have heard about the phrase “a case of mistaken identity” which actually implies a person was mistakenly identified as someone else and was given authority to do some important information. In context of IT environment, a case of...
Consumer Identity Management – 10 Key Things You Need To KnowBy Subhash Nukala On 25 Nov 2016
Consumer Identity Management (CIM) or Consumer Identity and Access Management (CIAM) is slowly becoming the core of modern Business because it allows businesses to create a single view of the customer, independent of how many systems are present. This single...
Privileged Identity Management – Why We Need It?By Susmita Sankaran On 25 Nov 2016
In an organization’s IT environment, there are several user accounts. Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration. These accounts are also called root accounts, administrator, admin...
The Rise of Cloud-based Managed Security ServicesBy Prasenjit saha On 28 Mar 2016
Cyber security is a massive issue in today's digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are...
Identity and Access Management Tips For Security ProfessionalsBy Prasenjit saha On 24 Mar 2016
The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
These blogs might interest you
by Somayaji Dhavala on 7 Dec 2023
by Rajiv Shah on 7 Dec 2023
by Ritesh Alur on 4 Dec 2023
by Tarun Vijay Bonthu on 28 Nov 2023
Subscribe for blog updates