Category: IAM Best Practices

Health is one of the most precious assets for people and healthcare records are equally valuable. The number of healthcare records are way higher than that of the credit card numbers available in the black market. There are people who steal healthcare data and get hold of the home … Read More

Irrespective of the industry you are catering to, Virtual Private Networks (VPN) are still used at large to meet the organizational IT ecosystem demands. These VPNs enable remote users to securely establish connection with the core IT infrastructure components, be it over on-prem setups or cloud infrastructure hosted with … Read More

Growing concerns of cybersecurity have left business owners in dilemma. 80% of organizations prioritize their privilege security and expressed how critical it is to maintain an isolated environment to ensure IT security. Protecting privileged assets and isolating environments within your IT security eco-system is still a tough task. Because, … Read More

Deploying IAM Managed Services have become a norm for enterprises to track and secure their business information, be it about their finances or employees and their identities. Being a business owner, your client needn’t bother about slogging stats and security features threatening to wreak havoc to their enterprise. IAM … Read More

When it comes to managing the various aspects of a small enterprise, most technology providers put less efforts in that regard. But, solutions like Salesforce managed Services have made a difference to the age-old trend of focusing on large enterprises and taking care of small ventures as well. Being a … Read More

I had an amazing discussion on my thoughts shared on Hybrid IT with few of you. One important challenge that was identified was unifying identities in a Hybrid setup. No doubt, identities drive IT processes in an enterprise setup, unification of identities thus becomes an important aspect of IT processes. … Read More

I will pick up from the point where I left – Is Hybrid a problem or an opportunity?
The takeaway for me – Hybrid IT will continue to be there for at-least next few years until we have standards, best practices and lessons learnt. For sure, managing Hybrid Eco-System is a … Read More

And how to fix that…
Lack of control over SSH Keys is making hackers surpass Secure Shell security layer. The SSH Trick is when hackers use SSH Keys to log into servers. Most organizations are inadequately prepared for detecting a misuse of SSH keys. The trick is predominant, I realized … Read More

Information security starts by controlling – ‘Who’ has ‘What’ access to systems & data and ‘How’ that information is being accessed. Keeping in perspective the security aspect of information routed via SSH Key management, there are a few important questions for IT department heads to ponder over:

Can your IT Team … Read More

It has been increasingly observed that companies are moving towards managing their IAM projects in-house, rather than engaging an outside vendor. Although, the step has its own merits, starting with gaining greater control over project delivery and saving cost in the short-run, for a long-term perspective, such a move could … Read More

An absolute nightmare for an IT security professional is when protected data is accessed by unauthorized personnel. While passwords, firewalls and other basic protection methods are becoming easily ‘hackable’, organizations are seen shifting towards Multi-Factor Authentication (MFA), which includes voice callbacks, SMSes and OTPs, to combat the issue.
Although, MFA has … Read More