Author: Dinesh Harikrishnan

Security isn’t a one-time investment: 3 key areas where most organizations fail

Your management team says that the time has come to invest in your organization’s cybersecurity. Your operations team agrees and…

3 years ago

Web content filtering: The benefits to hybrid organizations

The main objectives behind web content filtering are accuracy, scalability, and maintainability and unless you have the right service provider…

3 years ago

The simpler way to manage Remote Employee Onboarding

When onboarding new employees, it’s important to keep the process as simple as possible. When all new user activity occurs…

4 years ago

Identifying Training Opportunities and Boosting Productivity with a User Activity Monitoring (UAM) tool

User Activity Monitoring tools (UAMs) have a bad rep, with many employees believing that they are used by employers for…

4 years ago

How does a true PAM work?

A Privileged Access Management (PAM) solution helps to secure and control privileged access to critical software and assets. Credentials and…

4 years ago

Think beyond Active Directory for hybrid working

In 2020, the pandemic had a major impact on security and cyberattacks. The year saw the highest number of data…

4 years ago

The Goldilocks Zone of Content Restriction: Not too wide, not too narrow, but just right

Do you need to restrict content for your employees? Or can you allow them complete and free access to the…

4 years ago

Data Logging and Audit: The IAM advantage

One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…

4 years ago

Flexible Identity: IAM solutions need to bend… a little at least!

In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…

4 years ago

Authentication, Authorization, Auditing: the Three Pillars of IAM

In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…

4 years ago