Rajesh Mittal

With over 20 years of experience in Application Security, Identity Management and IT infrastructure related projects, Rajesh has a developed a solid understanding of all aspects of IT security field and has assisted clients, of all sizes, in almost all segments of their Identity and Access Management journey. His core competency and passion lies in integrating heterogeneous products, fostering innovation to develop new Solutions and solving customer problems quickly and effectively. He is VP of Technology and Co-Founder of Avancer Corporation and leads Technical Strategic Planning, New Business Development, Marketing and Business Expansion. Prior to starting Avancer Corporation, Rajesh’s entrepreneurial venture, he has worked with PWC Consulting/Entology/HSBC/ LG Electronics in various capacities developing IT security solutions spanning multiple geographies. Rajesh holds a BE in Electronics Engineering from University of Pune, and MBA in Finance and Leadership from Stern School of Business, New York University.

shutterstock_289768328
Let’s understand what creates a ground work for intelligent Identity and Access Management When it comes to creating intelligent system networks, it needs to be in coordination with various aspects of business. Starting with basic automation and computing to allowing modes for keeping Data in Motion, bringing checkpoints to ensure safety, falling in line with trends such as Internet of Things (IoT). A continuous unobstructed interaction amongst users – internal and external, devices – spread across multiple touch-points run on real-time basis. Adding to the complexity of such systems is embedded electronics, software, hardware and networks connectivity aiming at achieving greater value and service. In keeping with the threats, the Governments have applied Cyber Security Regulations to ensure that businesses, companies ... Read More
06/24/2015Rajesh Mittal
Users-Biggest-security-threat
I will not break a news if I say that cyber criminals enter your systems through the user route. While IAM technology is effective in protecting the systems and processes, what is beyond the shield of technology is human fail-ability and intentional trickery. For example, what to do when: An employee (users) has lost his mobile phone, given that it was synced with confidential company applications – case of human fail-ability. An employee utilized a co-worker’s workstation to pull out sensitive information – a case of intentional trickery. Many users unknowingly give away ways for unscrupulous elements to enter organizational IT systems. How can you curtail it?Now if I were to ask you to get your mind running and bring more such scenarios in ... Read More
06/18/2015Rajesh Mittal
OTP
While making a shopping online on Amazon Indian portal – I was to login and follow through Two Factor Authentication (TFA) process. In the USA, TFA is widely adopted by financial organization or online banking, but when it comes to making purchases online – we are still stuck with static password type of authentication that is prone to misuse. Although the death of the password is certain and we may not be there yet. Till that time, Passwords are the very much needed tools for keeping an identity intact and access safe. Irrespective of how often we read about hacking and cyber-crimes, a weak password keeper only assumes that an attacker will never find him. Static passwords offer the ... Read More
05/18/2015Rajesh Mittal
shutterstock_243544168
Here is a situation, you enter into a conference hall every day and you have to greet each member (it could be just five members on a day and fifty members on some other day). Would you not prefer greeting them all at once, rather than making non-productive individual small talks and wasting major chunk of your precious time. IT enabled work environment interacts with multiple platforms, each platform support business processes, users, employees, departments and system administrators to accomplish their job functions. Often users (employees) have to sign on to multiple platforms because the Single Sign On feature is not adopted by the enterprise. ... Read More
05/11/2015Rajesh Mittal