Category: Security & Compliance

Healthcare, being a social sector is designed for public access and traditionally has not considered enforcing safeguards. An effective way to approach HIPAA compliance in a healthcare establishment is by ensuring that any myth related to the regulation is defied. It becomes crucial to gain deep knowledge … Read More

Did you receive a request for approval lately? Is that request lying on your inbox unattended? Is there any further clarification (or worse – a series of clarifications) required to process that request – perhaps a policy consideration which might require intervention of a super senior resource? … Read More

When I think of government enacted legislation, I remember the famous quote from one of the influential humanist philosophers, Marsilio Ficino, “Everything in nature is either a cause aimed at you or the consequence made by you”. With the history behind us on the Enron accounting scandal … Read More

Many organizations look at limited functionality when implementing IAM solutions and they do not understand the implications of such a lackadaisical approach on their infrastructure and architecture. The benefits of Service Oriented Architecture (SOA) are acclaimed to bring down integration costs, enable greater asset reuse, and arm … Read More

I will not break a news if I say that cyber criminals enter your systems through the user route. While IAM technology is effective in protecting the systems and processes, what is beyond the shield of technology is human fail-ability and intentional trickery.
For example, what to do … Read More

Within the domain of Identity Management is a focused branch that takes special note of the special requirements of powerful accounts within the IT infrastructure of an enterprise. Those powerful accounts are knows as Privilege Accounts given the fact that they have access to most crucial information, they … Read More

The parade of regulations related to cyber security means more of compliance, discipline and agility to be showcased by businesses. Identity and Access Management technology has been instrumental in helping businesses achieve an upper hand on the regulatory requirements.
Ever since internet … Read More

And yes by Hillary I am referring to the Secretary of State, Senator and former First Lady and probably the next President of the USA.
For those who don’t know below is a brief summary of what happened:
Hillary Clinton used her personal email account which … Read More

Integrating Identity Management (IdM) technology within the system is imperative for healthcare services providers. Healthcare providers have to remain on top at providing best care to patients. IAM technology has evolved through years to help healthcare organizations in achieving a secure IT framework, and be compliant to landmark … Read More

IDaaS (Cloud based Identity Management solution) allows benefits of Identity Management to all.
Identity as a Service (IDaaS) or Cloud Identity Solutions come into play when businesses decide to take a strategic decision and build on legacy IAM System. In case of healthcare, IDaaS based setups become all the … Read More