Category: IAM Best Practices
Share This
Facebook Twitter LinkedIn Whatsapp Email
Your browser does not support theaudio element.
When it comes to managing the various aspects of a small enterprise, most technology providers put less efforts in that regard. But, solutions like Salesforce managed Services have made a … Read More
I had an amazing discussion on my thoughts shared on Hybrid IT with few of you. One important challenge that was identified was unifying identities in a Hybrid setup. No doubt, identities drive IT processes in an enterprise setup, unification of identities thus becomes an important aspect of IT processes. … Read More
I will pick up from the point where I left – Is Hybrid a problem or an opportunity?
The takeaway for me – Hybrid IT will continue to be there for at-least next few years until we have standards, best practices and lessons learnt. For sure, managing Hybrid Eco-System is a … Read More
And how to fix that…
Lack of control over SSH Keys is making hackers surpass Secure Shell security layer. The SSH Trick is when hackers use SSH Keys to log into servers. Most organizations are inadequately prepared for detecting a misuse of SSH keys. The trick is predominant, I realized … Read More
Information security starts by controlling – ‘Who’ has ‘What’ access to systems & data and ‘How’ that information is being accessed. Keeping in perspective the security aspect of information routed via SSH Key management, there are a few important questions for IT department heads to ponder over:
Can your IT Team … Read More
It has been increasingly observed that companies are moving towards managing their IAM projects in-house, rather than engaging an outside vendor. Although, the step has its own merits, starting with gaining greater control over project delivery and saving cost in the short-run, for a long-term perspective, such a move could … Read More
An absolute nightmare for an IT security professional is when protected data is accessed by unauthorized personnel. While passwords, firewalls and other basic protection methods are becoming easily ‘hackable’, organizations are seen shifting towards Multi-Factor Authentication (MFA), which includes voice callbacks, SMSes and OTPs, to combat the issue.
Although, MFA has … Read More