What is Deprovisioning? Deprovisioning is the process of automatically removing a user's access from numerous SAAS app accounts and network infrastructure at the same time. Deprovisioning safeguards the security and confidentiality of the company by prohibiting departing employees from using corporate resources. The Deprovisioning action is triggered when an employee quits their job or changes [...] Read More →
What is IDaaS? IDaaS - Identity-as-a-Service, refers to identity management and access management services offered via the cloud rather than on-premises. Identity services maintain the information related to digital entities. In this form, it can be accessed and used in electronic transactions. An "as-a-service" model represents an operation where an external organization provides a service [...] Read More →
On September 2021, an attacker published credentials for 87,000 FortiGate SSL VPN devices online and created a huge threat to VPN Security by exploiting a known, old vulnerability. Investigators concluded that the credential was obtained by exploiting CVE-2018-13379, a vulnerability that allows unauthenticated attackers to download system files via specially crafted HTTP resource requests. Its [...] Read More →
With the rise in cloud storage and the advent of the internet, more and more businesses are moving their operations/data online. This has greatly reduced storage costs and eased business operations. Individual users have also greatly benefited from the internet to send text messages, post stories on social media sites, or learn a new skill. [...] Read More →
Although Federated Identity Management (FIM) and Single Sign-On (SSO) are frequently used interchangeably, SSO and FIM are not the same things. Access to apps and resources within a single domain is made possible via single sign-on. Single Sign-On (SSO) to applications across various domains or organisations is made possible by federated identity management. What is [...] Read More →
Identity and Access Management (IAM) is an advanced security structure for business processes, policies, and technologies that helps organizations to manage electronic/digital Identities of Workforce & Customers”. With an IAM structure in place, IT admin can make certain that the right people (Organizational employee, end-user) can access the tools they need to do their daily [...] Read More →
  In today’s technological age, along with keeping up with the latest trends in technology, businesses need to make sure that their cybersecurity and data protection measures are up to par. The COVID-19 pandemic has forced companies to adopt remote working practices and utilize cloud-based platforms, reinforcing the need for better cybersecurity measures.  By the [...] Read More →