By their very nature, IT network of educational/ academic institutions are used by a large number of transient users. One of the examples of a transient user is an aspiring student who fills up an application and use parent’s credit card to make the payment. Such details are stored in … Read More

As the need & acceptance for 24×7 connectivity grows in both personal & professional lives of the burgeoning corporate professionals all over the globe – a large number of organizations are now in need of enterprise-wide mobility. Such a business model requires intelligent application stores with a strong suite of … Read More

A Chief Information Security Officer (CISO) is someone who has climbed up to a senior-level executive role within an organization. The key responsibility is to establish, protect and maintain enterprise vision, strategy and program to ensure information assets are protected through right set of technological interventions. With time, the role … Read More