Mobile Search Mobile Menu

By Abhi Yadav

Simeio Receives Highest Score by Gartner in Traditional/Legacy Workforce IDaaS Use Case

We are delighted by Gartner’s most recent report on Critical Capabilities for Identity and Access Management as a Service, Worldwide in which Gartner gave Simeio the highest score in what it calls the “traditional/legacy workforce” use case. This use case describes organizations that have a mix of legacy (i.e. non-web-architected) on-premise applications and cloud-based software-as-a-service […]

By Abhi Yadav

Oracle OpenWorld Takeaways and Recap

The 2016 Oracle Open World (OOW) got off to an amazing start on Sunday afternoon with the announcement that Oracle was acquiring Palerra to extend its current security capabilities with a Cloud Access Security Broker (CASB) solution. The announcement made its way into Larry Ellison’s keynote speech and further amplified Oracle’s messaging around cloud and […]

By Abhi Yadav

Putting the “Service” in “Identity as a Service” — Part 2

Managed Identity Services: the next generation of IDaaS In my last post, I discussed how the “Service” part of “Identity as a Service” (IDaaS) can mean very different things to different IDaaS companies. To us, the “Service” part means “full service.” This stands in contrast to most other IDaaS firms where the “Service” part means […]

By Abhi Yadav

Putting the “service” in “Identity as a Service”

What’s in a word? When it comes to “service,” it can be a lot. You wouldn’t think a simple word like “service” could have people scratching their heads. And yet there’s one use in particular that seems to be creating some confusion: it’s the meaning of “service” in the term “Identity as a Service.” At […]

By Abhi Yadav

What the Apple-DOJ Case Can Tell You About Your Enterprise Security

The recent public dispute between Apple and the U.S. Department of Justice (DOJ) over the encrypted “San Bernardino“ iPhone has served as a powerful reminder of the challenges every enterprise faces when it comes to identity and data security. No matter what side of the issue you come down on, it’s clear that there’s a […]

By Abhi Yadav

Limit Vendor Risk – Step 3: Ensure Periodic Access Reviews are Performed

In my previous post, I discussed the second of four steps for limiting Vendor Risk. This month we will review Step 3: Ensure Periodic Access Reviews are Performed. To ensure security processes are in place and operating effectively, you must perform periodic access reviews in order to detect inaccuracies in provisioned access. These are “who, […]

By Abhi Yadav

Limit Vendor Risk – Step 1: Properly Grant and Remove Access

In my last post, I introduced four steps you can take to limit vendor risk. In this month’s post, we’ll take a slightly deeper dive into step 1: properly granting and removing access. Access to systems must be controlled and granted only with proper approvals. If you follow the steps below, you can easily maintain […]

By Abhi Yadav

Reducing Exposure to Breaches through Audit and Compliance (Part 4)

When a cyber breach occurs, the fallout impacts the entire organization. There can be theft of company secrets, regulatory fines, loss of revenue from negative brand reputation, and the termination and departure of the senior-most people in the company. Audit and compliance around access to systems is a board level topic. The prepared organizations are […]

1 2 3