Blog
Introduction AI agents are rapidly transforming the way organizations operate, collaborate, and innovate. But as enterprises embrace these powerful tools, a new and often overlooked challenge has surfaced:…
Matthew Maher
·
Oct 8, 2025
Blog
Introduction Agentic AI and conversational AI present exciting opportunities to transform how organizations conduct and manage access reviews. Here’s a breakdown of how to use Agentic AI in…
Niraj Tenany
·
Jul 15, 2025
Blog
Introduction In this blog, I share details on how to go about initiating an access review and managing the initiative. To find out more about access reviews, you can…
Niraj Tenany
·
Jun 18, 2025
Blog
Introduction IGA stands for Identity Governance and Administration. It's a core component of identity and access management (IAM) that focuses on managing digital identities and their access rights…
Niraj Tenany
·
Jun 11, 2025
Blog
Introduction On April 19, 2025, a Microsoft Lockout Incident occurred when organizations faced mass account lockouts due to the deployment of Microsoft Entra ID's new MACE detection App.…
Priyam Ghosh
·
Apr 22, 2025
Blog
Introduction In today's digital world, mobile devices are vital in every sector. Efficient management of these devices is key to a smooth operation experience. Securely handling a large…
Priyam Ghosh
·
Dec 17, 2024
Blog
Introduction USB drives, while convenient, pose a significant security risk, as they can easily introduce malware or facilitate data exfiltration. For organizations using Microsoft Intune and Microsoft Defender,…
Subhankar Bhattacharjee
·
Sep 11, 2024
Blog
Introduction The modern mobile-centric business landscape implies that safeguarding sensitive corporate data is a top priority. Employees have access to more devices to access company resources than before.…
Subhankar Bhattacharjee
·
Aug 16, 2024
Blog
Introduction Mobile devices have become an integral part of our daily lives, both for personal and professional purposes. As businesses increasingly rely on mobile technology, the need to…
Subhankar Bhattacharjee
·
Dec 7, 2023
Blog
Introduction: We have seen in the latest news how vendor and supplier attacks have penetrated large companies like Okta. This has prompted many customers to ask us “How…
Matthew Maher
·
Apr 25, 2022
Blog
Introduction: Building a fortress around your company’s mission-critical data is the ultimate goal for any mild-mannered IT executive. But who is playing the role of bouncer at the…
Matthew Maher
·
Apr 11, 2022
Blog
Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest…
Arghya Roy
·
Feb 10, 2022