Mobile Search Mobile Menu

By Amruta Gawde

Our Changing World Requires an IAM Paradigm Shift

  Amruta Gawde  Over the past decade, IAM has focused upon solving access management issues with purpose-built tools for a single function. In an effort to adapt to a growing and changing business environment, many organizations sidestep best practices, adding scripts and fixes to overcome tool limitations. Unfortunately, these approaches have proven to be costly to support, catastrophic when problems inevitably arise, and unsustainable for life-cycle management. In-house customizations only add more complexity to an already complex IT infrastructure.   A changing business environment requires a new approach  […]

By Simeio

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series”

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series”. The topic was “Why do I need IAM? How do I get started? IAM for the Lost.” The session hosts were Vikram Subramanian, VP of Solutions at Simeio Solutions, and Anne […]

By Simeio

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its latest “Ask Me Anything Coffee Talk Series”. The topic was “IAM Roadmapping.” The session hosts were Batool Aliakbar, Director of Delivery at Simeio Solutions, and Neda Pitt, VP of Information Security at Cisco. Here are some highlights from the […]

By Simeio

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series With the impact of the COVID-19, technology conferences, tradeshows, product launches, and other face-to-face events will be greatly scaled-down, even after the pandemic is over. That’s why Simeio is launching this ongoing virtual interactive talk series.  We invite you to join us, as we launch our […]

By Simeio

These Are the Biggest Cyber Threats Your Company Will Face in 2019

More than half of American companies have experienced a cyber attack that took an average of 68.9 days to solve. The cybersecurity landscape is constantly changing in response to new threats, which are on a steady rise. But both new and old cybersecurity risks threaten your operations and your profits. If you’re a business owner, the best way […]

By Michael Harvell

How to Avoid a Data Breach Through Effective Privileged User Management

Avoid a Data Breach Through Privileged User Management According to a study by Forester, up to 80 percent of data breaches are attributed to misuse or abuse of privileged credentials. This is because many organizations tend to overlook the importance of managing and securing their super accounts or administrator accounts. Like other users and typical IT workers, […]

By Tim Jester

7 Reasons Why Identity Administration is Your Best Protection

Thinking about investing in identity administration services? Read on for 7 reasons why identity administration is your best protection online. Companies today have more IT concerns than ever before. Nearly every employee at most firms needs some kind of user account and data access. The real problem becomes how you manage to create these accounts […]

By Tim Jester

5 Threats to Cloud Security (and the Cloud Security Strategies That’ll Keep Your Data Safe)

Cloud computing is a vital development that is central to our technology-focused future. But lax cloud security strategies can bring entire systems to their knees. The cloud has already proved to be a transformative technology across many sectors, and its influence is spreading quickly. This means that the need to know how to protect cloud-based data […]

access governance

By Tim Jester

Access Governance: What Is It & Why Do You Need It?

“Where should I put this big box of sensitive and business-critical documents? I’ll just leave them in the middle of the office for everyone to look at while I pop out. Should be fine.” Words you’d never hear in an office block. Any sensible manager knows that it’s not just about the risk of office theft, […]

1 2