Blogs

July 10, 2019

Idaptive’s Next-Gen Access Cloud – Based on Zero Trust Model

As technology landscape is changing fast, Artificial intelligence (AI) and machine language (ML), is gaining momentum. IT security vendors are keeping in pace with these trends. A key IT security vendor – Idaptive launched NextGen access (NGA) cloud in line with the AI and ML technologies. A study by Statista projects that businesses will spend […]

Read More
July 2, 2019

Role of Security Assessment in Mergers and acquisitions (M&A)

Due diligence Review (DDR) is critically important component in the M&A process, be it financial numbers or legal/ regulatory obligations with big monetary stakes.  Amidst all these, cyber security continues to be ignored or not even considered during such a M&A. Look at the M&A deal of Yahoo -Verizon wherein the whole deal was cut […]

Read More
June 10, 2019

Fintech Security warnings – being well prepared

With rapid increase in adoption of Fintech, come increased security threats. Newer technologies like Block chain, Artificial Intelligence (AI) in the Financial services industry is not only reducing the manual work but also makes the transaction and services more secure, however the security challenges still remain as both these technologies are at nascent stage rather […]

Read More
May 21, 2019

Rise & Rise of API’s

Application programming interface (API) being the hidden backbone of applications. Developers rely on these API’s to communicate with another software programs or applications. According to a survey findings indicate 69% of organizations expose their API to public and partners, wherein an average of 363 different API’s is being used. Nowadays threats and vulnerabilities are increasing, […]

Read More
May 6, 2019

AI, BYOD & IAM –getting ready

Data breach is common and the number of organizations opting for IAM is on the rise always. The adaptability towards IAM has been around for a while.  With technology advancements in areas of AI, IoT, BYOD, biometrics, keystroke analysis, voice & speech recognition, facial recognition, location with date and time to determine end users access […]

Read More
April 22, 2019

PAM – The next frontier in security services

Data breaches are starting to become quite common and organizations are taking different solution to prevent security thefts. Many Privileged users or super users who have access to all the critical information in an organization are prone to be target of many data breaches as they have elevated permission and access to many confidential data […]

Read More
April 11, 2019

Bridging the security gap with SOAR

Cyber security threats are evolving and organizations face major security challenges like alert overload, increasing number of disparate security tools, and struggling to report their operational performance.   To manage all of it proved costly, time consuming and complex as well.  In the late 90’s there was the evolution of Security Information and Event Management (SIEM […]

Read More
April 1, 2019

Will DB Shrink in SQL Server affect database performance?

In a database, based on the initial allocation or extension and subsequent operation on tables, objects will hold more unused space than required. Shrinking the database to a minimum required and releasing most of the unused space is possible. This may be a positive move as the larger freed space will improve performance. But shrinking […]

Read More
March 14, 2019

How to avoid sending blank report to your customers in SAP-BO?

Clearly no one wants to open a blank report. It’s a bit irksome to open a report and see no data. But sometimes scheduled reports may send a blank report with no data to your customer. So why generate a blank report? I use WebI to generate basic to complex reports. Web Intelligence (WebI) is […]

Read More
February 27, 2019

Why Server level patching is important?

In today’s world, security is one of the top priorities in a business. No matter what, it’s obvious we spend a certain amount of time to prevent hackers from stealing our sensitive information. But sometimes the most important solution may seem trivial. We have all seen it happen, data being stolen for malicious purposes which […]

Read More
February 24, 2019

Top 5 Mistakes companies do while implementing their SSO Solution

Need Analysis: SSO is so common yet very complex. First and Foremost, you must answer two primary objectives that can make your implementation easier. Why your organization needs the SSO solution? What are your goals in implementing SSO? SSO will be implemented across the organization involving multiple applications and impacting both internal and external business users. […]

Read More
February 21, 2019

Oracle Access Manager (SSO) Customers – Are you stuck with Oracle Vision and Roadmap?

Literally about hundred million of data has been stolen and exposed in the year 2018. Top Companies like Facebook, Under Armour, Exactis, Aadhar and many more has fallen prey to the hacking attacks. For any business data breach is obviously a disaster. Even in the latest Google survey it is found that 52% of the […]

Read More