Category: Security & Compliance

When I think of government enacted legislation, I remember the famous quote from one of the influential humanist philosophers, Marsilio Ficino, “Everything in nature is either a cause aimed at you or the consequence made by you”. With the history behind us on the Enron accounting scandal and the future … Read More

Many organizations look at limited functionality when implementing IAM solutions and they do not understand the implications of such a lackadaisical approach on their infrastructure and architecture. The benefits of Service Oriented Architecture (SOA) are acclaimed to bring down integration costs, enable greater asset reuse, and arm IT to respond … Read More

I will not break a news if I say that cyber criminals enter your systems through the user route. While IAM technology is effective in protecting the systems and processes, what is beyond the shield of technology is human fail-ability and intentional trickery.
For example, what to do when:

An employee (users) … Read More

Within the domain of Identity Management is a focused branch that takes special note of the special requirements of powerful accounts within the IT infrastructure of an enterprise. Those powerful accounts are knows as Privilege Accounts given the fact that they have access to most crucial information, they dictate the … Read More

The parade of regulations related to cyber security means more of compliance, discipline and agility to be showcased by businesses. Identity and Access Management technology has been instrumental in helping businesses achieve an upper hand on the regulatory requirements.
Ever since internet made a foray … Read More

And yes by Hillary I am referring to the Secretary of State, Senator and former First Lady and probably the next President of the USA.
For those who don’t know below is a brief summary of what happened:
Hillary Clinton used her personal email account which didn’t encrypt … Read More

Integrating Identity Management (IdM) technology within the system is imperative for healthcare services providers. Healthcare providers have to remain on top at providing best care to patients. IAM technology has evolved through years to help healthcare organizations in achieving a secure IT framework, and be compliant to landmark regulations such … Read More

IDaaS (Cloud based Identity Management solution) allows benefits of Identity Management to all.
Identity as a Service (IDaaS) or Cloud Identity Solutions come into play when businesses decide to take a strategic decision and build on legacy IAM System. In case of healthcare, IDaaS based setups become all the more important … Read More

The term ‘Cloud’ rattles the uncertainty bone to a maximum for plenty of the world’s population today. To add to agony, the moment the cloud is being discussed, there are a hundred different reasons behind what the cloud is, and why said … Read More

Mobility is playing an ever-increasing role in the life of contemporary business, providing everyone with a new level of communications freedom. The commercial benefits associated with greater mobility have been recognized as a great stimulus for businesses looking to transform to … Read More

Jack owns a small and ambitious startup project. He deals with a stride of potential clients through his tiny army of professionals. Being at work on the go is what make Jack’s setup cast success.
Competition is tough out there. Jack was never amused to … Read More

Ever wondered what exactly keeps you craving for that dish you had last week or makes a dish standout from the rest? The Recipe!! I am sure if a recipe for supper interests you so much, the recipe to setting up the best security management solution for your organization must … Read More