Financial industry is driven by data from user details, transactions, account details, payment information, access governance, vendor management and so on. For financial organizations, having a strong plan to defend against cyber-attacks and creating an action based process to deal with a potential attack are crucial. Getting basics in place, … Read More
While patient management system is an integral part of providing efficient healthcare services, data protection laws make it mandatory to provide reasonable safeguards to protect patient information from inappropriate use or disclosure.
With the growing number of apps, along with volumes of data to manage, healthcare providers are swamped with … Read More
The growth of mobile devices, social media and big data have resulted in companies relying heavily on outsourced IT and cloud services. Thereby, the focus towards privileged access for third-parties is also gaining prominence, helping companies to minimize risks of data theft and violation of compliance regulations.
Traditionally, most of the … Read More
Is it time to bid adieu to passwords and say hola to fingerprints? Are we finally moving towards a virtual world where the human body could be the key for accessing physical or virtual systems? Will biometrics sound the death knell on passwords or are we speculating a plot of … Read More
Great experience is a journey, not a destination. Here is a question – If Identity and Access Management (IAM) technology Integration is a Journey, how far have you reached?
The same applies to availing benefits from the IAM technology. IAM tech integration is a journey. You cannot stop at one … Read More
When I think of government enacted legislation, I remember the famous quote from one of the influential humanist philosophers, Marsilio Ficino, “Everything in nature is either a cause aimed at you or the consequence made by you”. With the history behind us on the Enron accounting scandal and the future … Read More
Quite a few features of Identity and Access Management Technology are not known to IT decision-makers. All they understand is a raw concept – allowing the right person to enter the office premises and in digital terminology, it is allowing for the right access to the organization’s IT systems. One … Read More
Cloud technology has come a long way. As businesses express their concerns over security considerations in a cloud environment, cloud operators come up with a befitting solution. Examples of this proactive approach include Single tenancy on the (private) cloud, Bring Your Own Encryption (BYOE), Ensuring Data in Motion, …
These are … Read More
While making a shopping online on Amazon Indian portal – I was to login and follow through Two Factor Authentication (TFA) process. In the USA, TFA is widely adopted by financial organization or online banking, but when it comes to making purchases online – we are still stuck with static … Read More
Let’s start with what is IdM VM Image?
In order to have a smooth functioning of IDM technology, the backend, front end, and middleware need to interact with each other. Therefore when an organization’s ecosystem is to bring Identity and Access Management technology, VM Image helps in simplifying … Read More
Passwords dates way back to 1960, the time of commencement of computing technology. It was quite secure and it still is a stylish factor in ensuring access security. We stand today in 2015 where the scope of computing has exploded and passwords … Read More
Here is a situation, you enter into a conference hall every day and you have to greet each member (it could be just five members on a day and fifty members on some other day). Would you not prefer greeting them all at … Read More