Access management
-
Creating and Maintaining a Security Operations Center (SOC)
By Karthik Palanisamy On 15 Sep 2016In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
-
Understanding Access Governance: Its Benefits and Challenges
By Prasenjit saha On 8 Jun 2016Access Governance is the process of monitoring and controlling who within your organization has access to what, when and how. However, this is easier defined than done. It is easy to confuse access governance with access management, when, in fact,...
-
Transforming From Traditional IAM to Business Driven IAG
By Jagadeesh CV On 18 Feb 2016Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
-
Choosing the best IAM Suite for your Organization: Criteria Checklist
By Subhash Nukala On 27 Oct 2015An Identity and Access Management solution (IAM) can make or break your organization’s security posture. There is no one ‘right’ solution since the solution that you choose will depend on any number of factors: the size of your organization (will...
-
Identity Management: Best Practices
By Sandip Gupta On 16 Sep 2015With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses...
Tag Cloud
Subscribe for blog updates