How to Protect Your Data from Third-Party BreachesBy Prasenjit saha On 28 Sep 2015
The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As...
Identity Management: Best PracticesBy Sandip Gupta On 16 Sep 2015
With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses...
IAM – Who has access to what information?By Iranna Hurakadli On 2 Mar 2015
An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
Transformation Of End- User Computing JourneyBy Suresh Kanniappan On 30 Dec 2014
End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few...
How important is Role and Identity ManagementBy Subhash Nukala On 14 Jan 2014
Identity Management (IDM) is a continuous process of all the tasks required to create, manage, and delete user identities in an organization. The core objective of an Identity management system is “One Identity per Individual". IDM begins with the creation...
These blogs might interest you
by Shantanu Shrivastava on 29 Nov 2022
by Tarun Vijay Bonthu on 29 Nov 2022
by Divyanshi Shrivastava on 15 Nov 2022
by Arthur Neil on 15 Nov 2022
Subscribe for blog updates