Mobile Search Mobile Menu

By Jeff Multz

I Believe Simeio’s Identity Orchestration is the Key to Unlocking the Cybersecurity Quagmire

I Believe Simeio’s Identity Orchestration is the Key to Unlocking the Cybersecurity Quagmire  I’m so excited to be here at Simeio. I’ve been working in the security sector for decades, and finally, I’ve arrived at a company that’s truly addressing cybersecurity with real understanding, impact, and results.   My experience in the cybersecurity domain has led me to realize that security begins and ends with identity. Not identity as a single-function product, but rather as […]

By Amruta Gawde

Our Changing World Requires an IAM Paradigm Shift

  Amruta Gawde  Over the past decade, IAM has focused upon solving access management issues with purpose-built tools for a single function. In an effort to adapt to a growing and changing business environment, many organizations sidestep best practices, adding scripts and fixes to overcome tool limitations. Unfortunately, these approaches have proven to be costly to support, catastrophic when problems inevitably arise, and unsustainable for life-cycle management. In-house customizations only add more complexity to an already complex IT infrastructure.   A changing business environment requires a new approach  […]

By Simeio

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series”

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series”. The topic was “Why do I need IAM? How do I get started? IAM for the Lost.” The session hosts were Vikram Subramanian, VP of Solutions at Simeio Solutions, and Anne […]

By Simeio

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its latest “Ask Me Anything Coffee Talk Series”. The topic was “IAM Roadmapping.” The session hosts were Batool Aliakbar, Director of Delivery at Simeio Solutions, and Neda Pitt, VP of Information Security at Cisco. Here are some highlights from the […]

By Esther Kim

Highlights of Simeio’s May 6th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 6th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its third “Ask Me Anything Coffee Talk Series”. The topic was “How Can I Maximize the Value of my IAM Solutions?”. The session hosts were Rob Streets, Account Director Midwest and Ohio Valley, and James Quick, Director of Solution Advisory […]

By Simeio

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series With the impact of the COVID-19, technology conferences, tradeshows, product launches, and other face-to-face events will be greatly scaled-down, even after the pandemic is over. That’s why Simeio is launching this ongoing virtual interactive talk series.  We invite you to join us, as we launch our […]

By Rohith Nair

Ransomware is Lurking Within, to Extort and Hold Your Data Hostage

The cyber threat landscape is continuously changing, and growing in complexity and numbers. Ransomware is a top cyber threat that every business must contain. To accomplish this requires a comprehensive cybersecurity strategy.  A lack of cohesive protective technologies, procedures, processes and user awareness, will lead to unintended consequences. If your company should fall victim to […]

By Siddharth Gandhi

Keeping Your Cybersecurity Hygiene Intact, in the Wake of Coronavirus

The coronavirus is having a major global impact, infecting tens of thousands, with increasing fatalities. We can debate whether or not the media and politicians are over-playing it. But the fact is, it should have us all concerned, prepared, and taking appropriate action to protect our businesses. More companies are choosing to not attend in-person […]

By Shawn Keve

IDaaS Underpins PCI DSS Requirement 8 Compliance – Part 3

PCI compliance matters when managing identity and access for remote third-party service providers. This is the third article in an ongoing series on PCI DSS Requirement 8 compliance. In a nutshell, PCI Requirement 8 is about identifying and authenticating all users to protect data and systems. When you can identify every user, you can control […]

By Gaurav Ranjit

Improving Workforce Engagement in a Post M&A Environment

In the last decade, there has been an uptick in the volume of global Mergers & Acquisitions (M&A) and some of the factors attributed to this rise are as follows: the increasing value of the dollar improving economies of scale rapidly changing industries and digitalization need for expansion and diversification of the business portfolio complement […]

1 2