How SCIM can help to solve the case of mistaken identity?By Jageesh KV On 24 Aug 2017
Overview We have heard about the phrase “a case of mistaken identity” which actually implies a person was mistakenly identified as someone else and was given authority to do some important information. In context of IT environment, a case of...
Identity and Access Management Tips For Security ProfessionalsBy Prasenjit saha On 24 Mar 2016
The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
Transforming From Traditional IAM to Business Driven IAGBy Jagadeesh CV On 18 Feb 2016
Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
IAM – Who has access to what information?By Iranna Hurakadli On 2 Mar 2015
An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
These blogs might interest you
by Deepak Kumar on 13 Feb 2024
by Priya Kanduri on 13 Feb 2024
by Ankita Tripathy on 13 Feb 2024
by Shantanu Shrivastava on 25 Jan 2024
Subscribe for blog updates