While making a shopping online on Amazon Indian portal – I was to login and follow through Two Factor Authentication (TFA) process. In the USA, TFA is widely adopted by financial organization or online banking, but when it comes to making purchases online – we are still stuck with static ... Read More
05/18/2015Rajesh Mittal
To Business With Love…
The parade of regulations related to cyber security means more compliance, discipline and agility to be showcased by businesses. Identity and Access Management technology has been instrumental in helping businesses achieve an upper hand on the regulatory requirements. Ever since the internet made a foray the government has been on the ... Read More
05/15/2015Team Avancer
BYOD and Hillary
And yes by Hillary I am referring to the Secretary of State, Senator and former First Lady and probably the next President of the USA. For those who don’t know below is a brief summary of what happened: Hillary Clinton used her personal email account which didn’t encrypt ... Read More
05/15/2015Team Avancer
Let’s start with what is IdM VM Image? In order to have a smooth functioning of IDM technology, the backend, front end, and middleware need to interact with each other. Therefore when an organization’s ecosystem is to bring Identity and Access Management technology, VM Image helps in simplifying ... Read More
05/15/2015Team Avancer
Passwords dates way back to 1960, the time of commencement of computing technology. It was quite secure and it still is a stylish factor in ensuring access security. We stand today in 2015 where the scope of computing has exploded and passwords ... Read More
05/15/2015Team Avancer
Password Best Practices
The always in fashion technical crime (hacking) runs on the idea of guessing or stealing a password. Passwords are a tiny piece of the puzzle that protects user identity. They are the keys that unlock access to various applications over the internet. These applications could be sensitive in nature depending ... Read More
05/15/2015Team Avancer
The cost of implementing an IAM solution is often frowned at, while organizations continue with struggle of managing identities, authorizing and authenticating users. We at Avancer strongly believe that this year is going to be a game changer, we are likely to witness ... Read More
05/11/2015Team Avancer
Here is a situation, you enter into a conference hall every day and you have to greet each member (it could be just five members on a day and fifty members on some other day). Would you not prefer greeting them all at ... Read More
05/11/2015Rajesh Mittal
Integrating Identity Management (IdM) technology within the system is imperative for healthcare services providers. Healthcare providers have to remain on top at providing best care to patients. IAM technology has evolved through years to help healthcare organizations in achieving a secure IT framework, and be compliant to landmark regulations such ... Read More
05/11/2015Team Avancer
IDaaS (Cloud based Identity Management solution) allows benefits of Identity Management to all. Identity as a Service (IDaaS) or Cloud Identity Solutions come into play when businesses decide to take a strategic decision and build on legacy IAM System. In case of healthcare, IDaaS based setups become all the more important ... Read More
05/11/2015Team Avancer
Before we speak about the trends, let have a little chat about where 2014 left! The curtain raiser for 2014 was Target Identity Theft Scandal, and the curtain closed with Amazon Scam Email, ringing bells of Identity theft threats. Each of such events have pointed at ... Read More
05/11/2015Team Avancer
Knowing that in order to stay competent, businesses started bringing state-of-art innovative solutions into office premises. Today it is impossible to imagine a business without computing assistance. It has surpassed limited office dimensions and defied traditional work settings. As we talk ... Read More
05/11/2015Team Avancer