Blog
Niraj Tenany
-
Jun 11, 2025
Introduction IGA stands for Identity Governance and Administration. It's a core component of identity and access management (IAM) that focuses on managing digital identities and their access rights…
Blog
Priyam Ghosh
-
Apr 22, 2025
Introduction On April 19, 2025, a Microsoft Lockout Incident occurred when organizations faced mass account lockouts due to the deployment of Microsoft Entra ID's new MACE detection App.…
Blog
Priyam Ghosh
-
Dec 17, 2024
Introduction In today's digital world, mobile devices are vital in every sector. Efficient management of these devices is key to a smooth operation experience. Securely handling a large…
Blog
Subhankar Bhattacharjee
-
Sep 11, 2024
Introduction USB drives, while convenient, pose a significant security risk, as they can easily introduce malware or facilitate data exfiltration. For organizations using Microsoft Intune and Microsoft Defender,…
Blog
Subhankar Bhattacharjee
-
Aug 16, 2024
Introduction The modern mobile-centric business landscape implies that safeguarding sensitive corporate data is a top priority. Employees have access to more devices to access company resources than before.…
Blog
Subhankar Bhattacharjee
-
Dec 7, 2023
Introduction Mobile devices have become an integral part of our daily lives, both for personal and professional purposes. As businesses increasingly rely on mobile technology, the need to…
Blog
Matthew Maher
-
Apr 25, 2022
Introduction: We have seen in the latest news how vendor and supplier attacks have penetrated large companies like Okta. This has prompted many customers to ask us “How…
Blog
Matthew Maher
-
Apr 11, 2022
Introduction: Building a fortress around your company’s mission-critical data is the ultimate goal for any mild-mannered IT executive. But who is playing the role of bouncer at the…
Blog
Arghya Roy
-
Feb 10, 2022
Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest…
Blog
Arghya Roy
-
Jun 26, 2018
IT departments are rapacious for any robust or recognized slants that make your own device (BYOD) access of enterprise resources both secure and reliable. Some years ago, everything…