How SCIM can help to solve the case of mistaken identity?By Jageesh KV On 24 Aug 2017
Overview We have heard about the phrase “a case of mistaken identity” which actually implies a person was mistakenly identified as someone else and was given authority to do some important information. In context of IT environment, a case of...
Identity and Access Management Tips For Security ProfessionalsBy Prasenjit saha On 24 Mar 2016
The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
Transforming From Traditional IAM to Business Driven IAGBy Jagadeesh CV On 18 Feb 2016
Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
IAM – Who has access to what information?By Iranna Hurakadli On 2 Mar 2015
An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
These blogs might interest you
by Vijay Bharti on 30 Mar 2020
by Anand Veeramani on 30 Mar 2020
by Manu Tayal on 26 Mar 2020
by Manish Mehrotra on 26 Mar 2020
Subscribe for blog updates