Azure AD is the most popular tool for Access Management. However, most Identity Management, Governance, and Identity Administration features must…
“Oh, East is East and West is West, and never the twain shall meet”, said the Nobel Laurette Rudyard Kipling….
Identity and Access Management (IAM) is a complicated technology. Most vendors sell products that reflect the complexity of IAM technology….
You don’t want to move ahead with your Zero Trust Security implementation before you learn what’s best (new) on the…
Noncompliance with IRDAI’s latest mandates could result in hefty fines or worse. Compact Identity from Ilantus, an Indian IAM company…
Every business, regardless of its nature and size, is a potential target for cyberattacks. Organizations today are aware of the…
The Insurance Regulatory and Development Authority of India (IRDAI) guidelines were recently published for insurance companies and brokerage houses. Noncompliance…
Almost every day, we wake up to news about data breach, data manipulation and identity breaking into an essential system,…
To reduce weight, people flock to this or that diet in search of answers to their problems. The answer is…
Pay-per-use model is a true innovation of the subscription model. It decreases the entry cost of IAM to 1/10X. The…
What shines isn’t always Gold One of the first vendors that spring to mind when thinking about Access Management is…
Let’s face it: IAM is costing you a fortune. You may have Access Management (AM), and maybe Identity Governance and…
In 2021, leading industry analyst Gartner predicted that ‘over 70% of new IAM implementations by 2023 will be Converged IAM.’…
Basics The Throat (Vishuddhi) Chakra is located in the throat and is responsible for self-expression. It is a masculine chakra and…
Basics This feminine chakra (one that receives energy rather than gives it to other chakras,) is situated in the middle…
Basics The manipur chakra is located near the solar-plexus. It is yellow in color, and it’s element is fire. It…
Almost every day, we wake up to news about data breach, data manipulation and identity theft. This has led us…
In the year 2005, the world heard about the first major data breach where 1.4 million credit card numbers…
Basics The sacral chakra is situated between the hips. It is a feminine chakra (which means that it receives energy…
While most of us believe that cyber attackers would be wary of human intelligence to combat cybercrimes; attackers have a…
Perhaps you’ve been looking for an Access Management (AM) and/or Identity Governance and Administration (IGA) solution but have only found…
Basics The root chakra is situated at the base of the spine. It is a red, spinning disc of pranic…
The advent of mobile phones, as we all know, changed the game of communications—”made the world smaller” as it is…
We all grew up reading about the unfortunate yet famous war times. The stories igniting several movies, stringing at the…
Our bodies are fueled by energy. We are not talking here about the energy which comes from food, ie., caloric…
How CI Helps Cooperative Banks Meet RBI’s Latest Security Guidelines After discovering that Indian urban cooperative banks (UCBs) have been…
Learn How Compact Identity Delivers If you are thinking of adopting Zero Trust principles in your IT environment, you would…
As IGA technology and solutions continue to evolve, industry analyst Gartner released their latest review of what products are best…
If you are looking for an IAM product, don’t miss out on Converged IAM. It will be preferred by over…
It is dangerous to be stuck in the past. What you knew yesterday could result in failure today. If you…
You wouldn’t buy a home security system without understanding what methods burglars typically use to get into your home. So…
With great power comes great responsibility – most of us have heard this famous quote. When it comes to businesses…
In this final blog of our “Perfect Health” series, we provide a guide to achieving the health that you deserve….
In our last blog, we discussed the concept of perfect health. We talked about the fact that medical science looks…
The concept of health has been evolving over the last few decades. What was initially thought to be simply the…
After discovering that Indian urban cooperative banks (UCBs) had been consistently failing to maintain an acceptable degree of security within…
In October 2019, more than 1.3 million credit and debit card details from Indian banks were found available for sale…
Corporate Network Snooping, in a security context, is gaining or trying to gain unauthorized access to another employee’s or the…
Traditionally, Identity and Access Management has been considered an investment only pertinent to large scale enterprises. However, over the last…
There are three key dimensions that are extremely important for the success of any IAM solution. Any identity and access…
Looking at the bigger picture, mergers and acquisitions often prove highly beneficial for organizations in the longer run and help…
Since 2018, the average number of incidents involving employee or contractor negligence has increased from 13.2 to 14.5 per organization….
Gloom casts a shadow on everything as the most unprecedented phenomenon of our times, COVID-19, has been interrupting normal life…
Just a few years ago, Access Management was still considered a luxury or ‘nice-to-have’ by most organizations. But today, especially…
Identity Management is associated with improved convenience, better authentication, and enhanced security. Popularly, it is thought of as Single Sign-on…
Some of the things that come as part and parcel of dealing with software solutions from vendors are – the…
Remote work has taken over all parts of the world for everything apart from essential services due to COVID-19 pandemic….
Ilantus has been in the Identity Management space since the year 2000. Identity Management is a cybersecurity discipline. With our…
According to the “Modern Bank Heists’ report by VMware Carbon Black, this coronavirus period has seen a 238% surge in…
Budget cuts and dwindling resources are center-front in COVID-19 times. How does a business determine what to purchase and what…
A product is made for its users. However, with the onslaught of new technologies, solutions are being created by showcasing…
Access Reviews Pose a Critical Challenge Even Today Access reviews pose a challenge for all companies. Compliance with regulatory statutes…
Situations in which access reviews are done manually, and often with faulty results which cause auditors to raise a lot…
Educational institutions have always been targets for hackers. The reason is quite simple, there is a lot of data out…
You hear reports of data breaches of different scales every other day. Sometimes the companies are applauded for the way…
Passwords are meant to secure critical accounts and applications. However, in this digital age, passwords are more of a cyber…
DIY or Do-It-Yourself is a seemingly interesting trend. Making things on your own which you’d otherwise have to buy is…
The tug of war between organizations aiming to achieve optimal cyber security and cyber attackers who are determined to break…
“It won’t be an exaggeration to say that some of the big losses suffered by banks on account of frauds…