Mobile Search Mobile Menu

By Simeio

10 Ways to Make Your Passwords Safer – #8 is Get Rid of Them!

I used to really dislike passwords. I found them aggravating and tedious. And quite frankly, I still don’t like them very much. But we’re stuck with them —at least for the time being. Let’s all agree, passwords are problematic. But they don’t need to be if we use logical policies, governance, technology and products that […]

By Simeio

Improving Digital Customer Experiences Begins with CIAM

  Today’s pre-packaged, grab-and-go products and services are designed to satisfy our growing desire for instant gratification. In the digital era, everything is always on and available at our fingertips, which has created high expectations for consumers interacting with brands online. The consumerism of online services has created an insatiable demand for safe, user-friendly, transparent, […]

By Jeff Multz

I Believe Simeio’s Identity Orchestration is the Key to Unlocking the Cybersecurity Quagmire

I Believe Simeio’s Identity Orchestration is the Key to Unlocking the Cybersecurity Quagmire  I’m so excited to be here at Simeio. I’ve been working in the security sector for decades, and finally, I’ve arrived at a company that’s truly addressing cybersecurity with real understanding, impact, and results.   My experience in the cybersecurity domain has led me to realize that security begins and ends with identity. Not identity as a single-function product, but rather as […]

By Amruta Gawde

Our Changing World Requires an IAM Paradigm Shift

  Amruta Gawde  Over the past decade, IAM has focused upon solving access management issues with purpose-built tools for a single function. In an effort to adapt to a growing and changing business environment, many organizations sidestep best practices, adding scripts and fixes to overcome tool limitations. Unfortunately, these approaches have proven to be costly to support, catastrophic when problems inevitably arise, and unsustainable for life-cycle management. In-house customizations only add more complexity to an already complex IT infrastructure.   A changing business environment requires a new approach  […]

By Simeio

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series”

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series”. The topic was “Why do I need IAM? How do I get started? IAM for the Lost.” The session hosts were Vikram Subramanian, VP of Solutions at Simeio Solutions, and Anne […]

By Simeio

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its latest “Ask Me Anything Coffee Talk Series”. The topic was “IAM Roadmapping.” The session hosts were Batool Aliakbar, Director of Delivery at Simeio Solutions, and Neda Pitt, VP of Information Security at Cisco. Here are some highlights from the […]

By Jayne Hallock

Highlights of Simeio’s May 6th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 6th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its third “Ask Me Anything Coffee Talk Series”. The topic was “How Can I Maximize the Value of my IAM Solutions?”. The session hosts were Rob Streets, Account Director Midwest and Ohio Valley, and James Quick, Director of Solution Advisory […]

By Simeio

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series With the impact of the COVID-19, technology conferences, tradeshows, product launches, and other face-to-face events will be greatly scaled-down, even after the pandemic is over. That’s why Simeio is launching this ongoing virtual interactive talk series.  We invite you to join us, as we launch our […]

By Rohith Nair

Ransomware is Lurking Within, to Extort and Hold Your Data Hostage

The cyber threat landscape is continuously changing, and growing in complexity and numbers. Ransomware is a top cyber threat that every business must contain. To accomplish this requires a comprehensive cybersecurity strategy.  A lack of cohesive protective technologies, procedures, processes and user awareness, will lead to unintended consequences. If your company should fall victim to […]

By Siddharth Gandhi

Keeping Your Cybersecurity Hygiene Intact, in the Wake of Coronavirus

The coronavirus is having a major global impact, infecting tens of thousands, with increasing fatalities. We can debate whether or not the media and politicians are over-playing it. But the fact is, it should have us all concerned, prepared, and taking appropriate action to protect our businesses. More companies are choosing to not attend in-person […]

1 2