Identity Management
-
How to Protect Your Data from Third-Party Breaches
By Prasenjit saha On 28 Sep 2015The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As...
-
Identity Management: Best Practices
By Sandip Gupta On 16 Sep 2015With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses...
-
IAM – Who has access to what information?
By Iranna Hurakadli On 2 Mar 2015An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
-
Transformation Of End- User Computing Journey
By Suresh Kanniappan On 30 Dec 2014End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few...
Digital Transformation Unified Communications and Device Management
-
How important is Role and Identity Management
By Subhash Nukala On 14 Jan 2014Identity Management (IDM) is a continuous process of all the tasks required to create, manage, and delete user identities in an organization. The core objective of an Identity management system is “One Identity per Individual". IDM begins with the creation...
Tag Cloud
Subscribe for blog updates