IAM
-
How SCIM can help to solve the case of mistaken identity?
By Jageesh KV On 24 Aug 2017Overview We have heard about the phrase “a case of mistaken identity” which actually implies a person was mistakenly identified as someone else and was given authority to do some important information. In context of IT environment, a case of...
-
Identity and Access Management Tips For Security Professionals
By Prasenjit saha On 24 Mar 2016The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
-
Transforming From Traditional IAM to Business Driven IAG
By Jagadeesh CV On 18 Feb 2016Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging...
-
IAM – Who has access to what information?
By Iranna Hurakadli On 2 Mar 2015An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
Tag Cloud
Subscribe for blog updates