Many organizations look at limited functionality when implementing IAM solutions and they do not understand the implications of such a lackadaisical approach on their infrastructure and architecture. The benefits of Service-Oriented Architecture (SOA) are acclaimed to bring down integration costs, enable greater asset reuse, and arm IT to respond more ... Read More
07/10/2015Rajesh Mittal
Quite a few features of Identity and Access Management Technology are not known to IT decision-makers. All they understand is a raw concept – allowing the right person to enter the office premises and in digital terminology, it is allowing for the right access to the organization’s IT systems. One ... Read More
07/06/2015Team Avancer
Cloud technology has come a long way. As businesses express their concerns over security considerations in a cloud environment, cloud operators come up with a befitting solution. Examples of this proactive approach include Single tenancy on the (private) cloud, Bring Your Own Encryption (BYOE), Ensuring Data in Motion, … These are ... Read More
06/29/2015Team Avancer
Let’s understand what creates a ground work for intelligent Identity and Access Management When it comes to creating intelligent system networks, it needs to be in coordination with various aspects of business. Starting with basic automation and computing to allowing modes for keeping Data in Motion, bringing checkpoints to ensure safety, ... Read More
06/24/2015Rajesh Mittal
I will not break a news if I say that cyber criminals enter your systems through the user route. While IAM technology is effective in protecting the systems and processes, what is beyond the shield of technology is human fail-ability and intentional trickery. For example, what to do when: An employee (users) ... Read More
06/18/2015Rajesh Mittal
While making a shopping online on Amazon Indian portal – I was to login and follow through Two Factor Authentication (TFA) process. In the USA, TFA is widely adopted by financial organization or online banking, but when it comes to making purchases online – we are still stuck with static ... Read More
05/18/2015Rajesh Mittal
To Business With Love…
The parade of regulations related to cyber security means more compliance, discipline and agility to be showcased by businesses. Identity and Access Management technology has been instrumental in helping businesses achieve an upper hand on the regulatory requirements. Ever since the internet made a foray the government has been on the ... Read More
05/15/2015Team Avancer
BYOD and Hillary
And yes by Hillary I am referring to the Secretary of State, Senator and former First Lady and probably the next President of the USA. For those who don’t know below is a brief summary of what happened: Hillary Clinton used her personal email account which didn’t encrypt ... Read More
05/15/2015Team Avancer
Let’s start with what is IdM VM Image? In order to have a smooth functioning of IDM technology, the backend, front end, and middleware need to interact with each other. Therefore when an organization’s ecosystem is to bring Identity and Access Management technology, VM Image helps in simplifying ... Read More
05/15/2015Team Avancer
Passwords dates way back to 1960, the time of commencement of computing technology. It was quite secure and it still is a stylish factor in ensuring access security. We stand today in 2015 where the scope of computing has exploded and passwords ... Read More
05/15/2015Team Avancer
Password Best Practices
The always in fashion technical crime (hacking) runs on the idea of guessing or stealing a password. Passwords are a tiny piece of the puzzle that protects user identity. They are the keys that unlock access to various applications over the internet. These applications could be sensitive in nature depending ... Read More
05/15/2015Team Avancer