Implementing a user provisioning system may be your key to resolving on- and off-boarding issues and access delays. Identity access and management (IdM) is a broad IT tool used by large firms to manage myriad user identities, compliance, and IT systems. In this entry we will look at IdM access granting in the on- and off-boarding, request […]
And yes by Hillary I am referring to the Secretary of State, Senator and former First Lady and probably the next President of the USA. For those who don’t know below is a brief summary of what happened: Hillary Clinton used her personal email account which didn’t encrypt messages during the first two months of […]
Recently there has been a barrage of cloud customer relationship management(CRM) services introduced by technology giants and relative unknowns alike. With the surge of “cloud”-hawking industrialists vying for CRM dominance, a battle of dimensions, of sort, has commenced, and the question posed now in cross-department meetings, “Should we cloud compute or rollout an onsite CRM solution?” At […]
Oops! Lost your smartphone or laptop? So what are you worried about: contacts, pictures or starting Candy Crush from Level 1 on your new phone? But, that is the least of your organizations concerns, they’re worried about the confidential e-mails, tenders and that million dollar idea that you have been working on for the last 4 months! […]