Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Prasenjit saha

The Rise of Cloud-based Managed Security Services

Cyber security is a massive issue in today’s digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are rarely protected well. Even as enterprises grapple with the challenge of mobile workers and an […]
Read Now
technology

Identity and Access Management Tips For Security Professionals

The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally critical. In fact, according to PwC’s Global State of Information Security Survey 2015, current and […]
Read Now

Best Security Practices in IT Infrastructure Implementation

The structure of IT infrastructure is changing and with it, its security aspects. Gartner in its ‘Top Predictions for IT Organizations and Users for 2016 and Beyond’ [1] reveals, ‘By 2018, 50 percent of enterprises with more than 1,000 users will use cloud access security broker products to monitor and manage their use of SaaS […]
Read Now
technology

Infrastructure Transformation: What and Why?

IT adoption is a necessity, but it is a complicated process. Both assertions are equally correct. Prasenjit Saha, CEO, Infrastructure Management Services and Security Business, Happiest Minds Technologies, tries to give an insight into how IT applications and processes today form the foundation of any business, through Infrastructure Management Services (IMS) Traditionally, IT was viewed […]
Read Now

IMS: Bridging the Gap between IT Goals and Business Needs

Traditionally, the IT function of an enterprise focussed on building and maintaining an IT infrastructure and expanded to keep pace with the market. Now, with most businesses adopting the Cloud and the immense remote IT possibilities it offers, TaaS (Technology as a Service) is threatening to make enterprise IT departments redundant. It is time for businesses […]
Read Now

How to Protect Your Data from Third-Party Breaches

The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As the whole world now knows, the HVAC supplier had access to more of Target’s systems than was needed […]
Read Now

The Growing Need For Enterprise Security

The coverage of enterprise security is constantly being redefined on account of globalization and blurring boundaries of Big Data. However, on a broad level, it still comprises of the four key disciplines of information security, business security, physical security and operational risk management.  According to estimates from Gartner, the information security spending is expected to […]
Read Now
technology

5 Drivers for Securing the Internet of Things

If you have any doubt at all about the impact of the IoT, consider these facts: 75 percent of the world’s population has access to a mobile device. When you compare the number of connected devices in 2009 (0.9 billion) to the number today, it represents a 30-fold increase. It is estimated that over 26 […]
Read Now

Archives

Categories