Mobile Search Mobile Menu
Gartner Symposium/ITxpo Recap

The 2016 Garner Symposium/ITxpo got off to a terrific start for the Simeio team. Gartner had just published its report…

Simeio Receives Highest Score by Gartner in Traditional/Legacy Workforce IDaaS Use Case

We are delighted by Gartner’s most recent report on Critical Capabilities for Identity and Access Management as a Service, Worldwide…

Oracle OpenWorld Takeaways and Recap

The 2016 Oracle Open World (OOW) got off to an amazing start on Sunday afternoon with the announcement that Oracle…

Putting the “Service” in “Identity as a Service” — Part 2

Managed Identity Services: the next generation of IDaaS In my last post, I discussed how the “Service” part of “Identity…

Limit Vendor Risk – Step 4: Ensure Access to Your IT Environment is Protected Using All Means Necessary

In my previous post, I discussed the third of four steps for limiting Vendor Risk. In this, the last of…

Putting the “service” in “Identity as a Service”

What’s in a word? When it comes to “service,” it can be a lot. You wouldn’t think a simple word…

What the Apple-DOJ Case Can Tell You About Your Enterprise Security

The recent public dispute between Apple and the U.S. Department of Justice (DOJ) over the encrypted “San Bernardino“ iPhone has…

Limit Vendor Risk – Step 3: Ensure Periodic Access Reviews are Performed

In my previous post, I discussed the second of four steps for limiting Vendor Risk. This month we will review…

Limit Vendor Risk – Step 2: Identify and Control Who is Accessing Your Critical Information

In my previous post, I discussed the first of four steps in how you can limit vendor risk. This month…

Limit Vendor Risk – Step 1: Properly Grant and Remove Access

In my last post, I introduced four steps you can take to limit vendor risk. In this month’s post, we’ll…

0 Shares