Category: Access Management

Powering Business Through Cloud-Based Identity and Access Management

INTRODUCTION Businesses of all sizes and types are increasingly using cloud computing services in production deployments for business-critical operations. Some of these organisations use cloud services to store and process […]

Ten Simple Steps to An Effective Data Security Strategy

Most IT professionals realise that there is such a thing as a data lifecycle, but there’s no common rule on what it is. Lifecycle may be a misleading term, since […]

Privileged User Monitoring and Auditing

Why Continuous Monitoring is Critical for Enterprise Compliance and Security Foreword Recording the detailed actions of privileged users is more critical in today’s business environment that is driving cost efficiencies […]

The Future of Identity and Access Management in 2018 and beyond

Identity and Access Management (IAM) is sure to be increasingly an integral part of our personal and business lives as the technological and societal landscape continues to evolve rapidly. While […]