Mobile Search Mobile Menu

By Simeio

7 Steps Toward Your Successful IAM Journey

We know that Identity and Access Management implementations are not simple. It is a mammoth task to take all the data, human and non-human identities, infrastructure, platforms, and applications into consideration. From there, you must align them and measure their effectiveness while ensuring that the user experience remains uncompromised. Organizations often find it challenging to […]

By Simeio

Is your Digital Transformation Strategy Backed with a Reliable CIAM Programme?

Improved customer trust and loyalty are two big outcomes of digital transformation programmes. Trust has often been the number one concern for most customers when sharing their personal data. There is an increased awareness among customers about how identities can be misused, accessed without authorisation, and misuse of their personal information without their consent. How organisations manage their customers’ digital identities is […]

By Simeio

Modernized App Onboarding Maximizes Digital Transformation Investments

The acceleration of digital transformation, brought on by the pandemic, has increased the need for modernized and converged IAM platforms. The modernization needed is not simply limited to a platform but requires new business processes and approaches for IAM adoption proliferation.   Application onboarding is the cumulative result of people, processes, and technologies working together. A successful application onboarding result is achieved when “the big three” are streamlined. Modernized application onboarding leverages automated processes through a repeatable model that smoothly moves applications into critical systems, like identity governance and administration (IGA), […]

By Simeio

Your Cloud Strategy is in great shape – can you say the same about IAM?

Whether it is a FOMO or truly a need for organizational transformation – cloud strategies have become a top priority across boardrooms, and tech leadership teams are scouting every way to fit it in the broad spectrum of goals. 57% of executives in a PWC survey on Cloud Business reported that they are working in conjunction with […]

By Randy Fields

How big and bad was Kaseya’s VSA software compromise? Not very.

If you compared the compromise visually in scope and impact to all of the breaches from Jan 2017 to April of 2021 (represented in the graph below), it would be about 1 pixel in size. It is so small that you would think you just need to clean your monitor. Most of the 1,500 customers […]

By James Quick

3 Ways Managed Privileged Access Management (PAM) Maximizes the Business Value of Digital Infrastructure 

Enterprise digital infrastructure has become more complex and costly to secure, manage and support. Contributing factors include multiple clouds, expanding enterprise perimeters and employees working remotely. The global pandemic has forced many enterprises from dipping their toes into modern digital infrastructure to jumping headfirst into digital transformation waters.  According to a 2020 Gartner report, 91% of organizations are engaged in some type of digital transformation, […]

By Mahua Chatterjee

Why Proactive Cybersecurity Strategies Should be in the Top 3 Priorities for Organizations

In less than a month, two cyberattacks shook the United States and other nations, impacting people’s daily lives. It’s ironic that the countries where these attacks happened are developed nations, where information security is expected to be top-notch, but the reality is far from it. Organizations that take proactive steps to counter cyberattacks are likely […]

By Simeio

10 Ways to Make Your Passwords Safer – #8 is Get Rid of Them!

I used to really dislike passwords. I found them aggravating and tedious. And quite frankly, I still don’t like them very much. But we’re stuck with them —at least for the time being. Let’s all agree, passwords are problematic. But they don’t need to be if we use logical policies, governance, technology and products that […]

By Amruta Gawde

Our Changing World Requires an IAM Paradigm Shift

  Amruta Gawde  Over the past decade, IAM has focused upon solving access management issues with purpose-built tools for a single function. In an effort to adapt to a growing and changing business environment, many organizations sidestep best practices, adding scripts and fixes to overcome tool limitations. Unfortunately, these approaches have proven to be costly to support, catastrophic when problems inevitably arise, and unsustainable for life-cycle management. In-house customizations only add more complexity to an already complex IT infrastructure.   A changing business environment requires a new approach  […]

By Balraj Dhillon

Top 2021 Predictions for Identity Management

During 2020, we witnessed an unprecedented year of change in response to the global pandemic. The upheaval caused organizations to quickly pivot and accelerate their digital modernization initiatives. This widespread shift was in response to a dramatic increase in the remote workforce, that in turn, created a surge in demand for IAM solutions. In so many […]

1 2 3 5 6 7