Blogs

May 6, 2019

AI, BYOD & IAM –getting ready

Data breach is common and the number of organizations opting for IAM is on the rise always. The adaptability towards IAM has been around for a while.  With technology advancements in areas of AI, IoT, BYOD, biometrics, keystroke analysis, voice & speech recognition, facial recognition, location with date and time to determine end users access […]

Read More
April 22, 2019

PAM – The next frontier in security services

Data breaches are starting to become quite common and organizations are taking different solution to prevent security thefts. Many Privileged users or super users who have access to all the critical information in an organization are prone to be target of many data breaches as they have elevated permission and access to many confidential data […]

Read More
April 11, 2019

Bridging the security gap with SOAR

Cyber security threats are evolving and organizations face major security challenges like alert overload, increasing number of disparate security tools, and struggling to report their operational performance.   To manage all of it proved costly, time consuming and complex as well.  In the late 90’s there was the evolution of Security Information and Event Management (SIEM […]

Read More
April 1, 2019

Will DB Shrink in SQL Server affect database performance?

In a database, based on the initial allocation or extension and subsequent operation on tables, objects will hold more unused space than required. Shrinking the database to a minimum required and releasing most of the unused space is possible. This may be a positive move as the larger freed space will improve performance. But shrinking […]

Read More
March 14, 2019

How to avoid sending blank report to your customers in SAP-BO?

Clearly no one wants to open a blank report. It’s a bit irksome to open a report and see no data. But sometimes scheduled reports may send a blank report with no data to your customer. So why generate a blank report? I use WebI to generate basic to complex reports. Web Intelligence (WebI) is […]

Read More
February 27, 2019

Why Server level patching is important?

In today’s world, security is one of the top priorities in a business. No matter what, it’s obvious we spend a certain amount of time to prevent hackers from stealing our sensitive information. But sometimes the most important solution may seem trivial. We have all seen it happen, data being stolen for malicious purposes which […]

Read More
February 24, 2019

Top 5 Mistakes companies do while implementing their SSO Solution

Need Analysis: SSO is so common yet very complex. First and Foremost, you must answer two primary objectives that can make your implementation easier. Why your organization needs the SSO solution? What are your goals in implementing SSO? SSO will be implemented across the organization involving multiple applications and impacting both internal and external business users. […]

Read More
February 21, 2019

Oracle Access Manager (SSO) Customers – Are you stuck with Oracle Vision and Roadmap?

Literally about hundred million of data has been stolen and exposed in the year 2018. Top Companies like Facebook, Under Armour, Exactis, Aadhar and many more has fallen prey to the hacking attacks. For any business data breach is obviously a disaster. Even in the latest Google survey it is found that 52% of the […]

Read More
December 6, 2018

4 Common Password Security Mistakes That Put Your Company at Risk

If you learned about a potential hazard in your office — let’s say a slippery floor — that threatened the well-being of your employees, you would act to address the issue immediately right? You put out a “CAUTION WET FLOOR” sign, and save the day… no one gets hurt… Yay! However, there are just as […]

Read More
June 28, 2018

How to Protect Administrative Access to Your Critical Systems

Administrative accounts are the #1 security vulnerability for corporate information systems. If access to these privileged accounts (domain admin, local admin, service accounts, etc.) is not properly secured and credentials fall into the wrong hands, bad actors can wreak havoc on your organization. And it’s not just external threats that you have to be weary […]

Read More
May 23, 2018

4 Steps You Can Take to Strengthen Your Information Systems Security

What is the single greatest point of vulnerability when it comes to information systems security? If you guessed “identity and access”, then you are correct! When you look at the largest security breaches over the past several years (Equifax, Yahoo, Target, Anthem, Uber, etc.), you will notice that they were all the result of stolen […]

Read More
August 7, 2017

Why Identity & Access Management is Important?

Identity & Accesses Management Is defined as policies, processes and technologies used for managing accesses to information systems, safeguarding digital data and tracking system activities. However, rise in data breach incidents and identity theft cases is expanding globally has forced the industry to redefine the growing field of identity management. The foremost importance of Identity […]

Read More