Identity & Access Governance
-
How SCIM can help to solve the case of mistaken identity?
By Jageesh KV On 24 Aug 2017Overview We have heard about the phrase “a case of mistaken identity” which actually implies a person was mistakenly identified as someone else and was given authority to do some important information. In context of IT environment, a case of...
-
Consumer Identity Management – 10 Key Things You Need To Know
By Subhash Nukala On 25 Nov 2016Consumer Identity Management (CIM) or Consumer Identity and Access Management (CIAM) is slowly becoming the core of modern Business because it allows businesses to create a single view of the customer, independent of how many systems are present. This single...
-
Privileged Identity Management – Why We Need It?
By Susmita Sankaran On 25 Nov 2016In an organization’s IT environment, there are several user accounts. Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration. These accounts are also called root accounts, administrator, admin...
-
The Rise of Cloud-based Managed Security Services
By Prasenjit saha On 28 Mar 2016Cyber security is a massive issue in today's digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are...
Cloud Services Cyber Security Identity & Access Governance Infrastructure Security Unified Communications and Device Management
-
Identity and Access Management Tips For Security Professionals
By Prasenjit saha On 24 Mar 2016The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
Tag Cloud
Subscribe for blog updates