Identity and Access Management
-
IAM – Who has access to what information?
By Iranna Hurakadli On 2 Mar 2015An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords,...
-
Transformation Of End- User Computing Journey
By Suresh Kanniappan On 30 Dec 2014End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few...
Digital Transformation Unified Communications and Device Management
Tag Cloud
Subscribe for blog updates