Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
Understanding Access Governance: Its Benefits and ChallengesBy Prasenjit saha On 8 Jun 2016
Access Governance is the process of monitoring and controlling who within your organization has access to what, when and how. However, this is easier defined than done. It is easy to confuse access governance with access management, when, in fact,...
Transforming From Traditional IAM to Business Driven IAGBy Jagadeesh CV On 18 Feb 2016
Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
Choosing the best IAM Suite for your Organization: Criteria ChecklistBy Subhash Nukala On 27 Oct 2015
An Identity and Access Management solution (IAM) can make or break your organization’s security posture. There is no one ‘right’ solution since the solution that you choose will depend on any number of factors: the size of your organization (will...
Identity Management: Best PracticesBy Sandip Gupta On 16 Sep 2015
With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses...
These blogs might interest you
by Shivadya Prasad on 29 Sep 2023
by Tarun Vijay Bonthu on 21 Sep 2023
by Namrata Biradar on 8 Aug 2023
by Amit Kumar on 31 Jul 2023
Subscribe for blog updates