Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Identity and Access Management

The Rise of Cloud-based Managed Security Services

Cyber security is a massive issue in today’s digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are rarely protected well. Even as enterprises grapple with the challenge of mobile workers and an […]
Read Now
technology

Identity and Access Management Tips For Security Professionals

The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally critical. In fact, according to PwC’s Global State of Information Security Survey 2015, current and […]
Read Now

Best Security Practices in IT Infrastructure Implementation

The structure of IT infrastructure is changing and with it, its security aspects. Gartner in its ‘Top Predictions for IT Organizations and Users for 2016 and Beyond’ [1] reveals, ‘By 2018, 50 percent of enterprises with more than 1,000 users will use cloud access security broker products to monitor and manage their use of SaaS […]
Read Now
Identity and Access Management

Transforming From Traditional IAM to Business Driven IAG

Providing the right people with the right access at the right time is critical in any organizational environment, irrespective of its size. In this age of explosive growth in network communications, increasing collaboration and policies like BYOD it is challenging for enterprises to determine who all have access to what resources and what they are […]
Read Now

Retailers Survey Report: The Perfect Storm Of Omnichannel Makes Landfall !

Omnichannel has come of age. Retailers are constantly challenged to ensure seamless and consistent customer experience across channels. Happiest Minds’ survey, targeted at executive leadership members of tier 1 and tier 2 US based retailers, aims to provide an insight in the maturity of today’s Omnichannel initiatives. The report covers the attributes that form the […]
Read Now

IAM – Who has access to what information?

An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords, identities and directories. However, the ultimate motive of an Identity and Access Management practice is to […]
Read Now
technology

Transformation Of End- User Computing Journey

End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few years that personalized computing has infiltrated enterprise spaces; owing to faster networks, Wi-fi hotspots and […]
Read Now

Archives

Categories