Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Identity Management

How to Protect Your Data from Third-Party Breaches

The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As the whole world now knows, the HVAC supplier had access to more of Target’s systems than was needed […]
Read Now
Identity and access management

Identity Management: Best Practices

With organizations increasingly focusing on access governance (as they should!), it would be foolish to underestimate the importance of Identity Management. Data on the what, why and when of information access must be complemented by the knowledge of who accesses data—in other words, the identity of the person accessing data. Identity management refers to the […]
Read Now

IAM – Who has access to what information?

An organization may need to get up to an array of processes to ensure that it measures up to an ideal Identity and Access Management model. This can range anything from automating account creation, assigning access, streamlining administration to unifying passwords, identities and directories. However, the ultimate motive of an Identity and Access Management practice is to […]
Read Now
technology

Transformation Of End- User Computing Journey

End-user computing (EUC) has been around for longer than we think. In fact, Virtual Desktop Infrastructure was introduced in early 2000s and, PDAs can be considered the progenitors of smartphones and tablets. However, it is only over the last few years that personalized computing has infiltrated enterprise spaces; owing to faster networks, Wi-fi hotspots and […]
Read Now

Archives

Categories