article thumbnail

Case Study: Improving ID and Access Management

Data Breach Today

What are some of moves that organizations can make to improve their identity and access management? Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview.

Access 145
article thumbnail

Charter Hall Case Study: Mobile Access Provides a Secure Yet Frictionless Tenant Experience

HID Global

The Charter Hall case study explores their decision to leverage mobile access control as a component of the security system for a seamless tenant experience.

Access 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 261
article thumbnail

Enterprise-managed IAM: An SRE team case study

IBM Big Data Hub

Enterprise-managed identity and access management (IAM) enables cloud administrators to centrally configure access and security settings for the entire organization. Case study A large banking client has a centralized site reliability engineering (SRE) team that manages operations for all resources in the organization.

Cloud 78
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft declared that an Emotet attack took down an organization’s network by overheating all the computers and bringing its Internet access down. ‘We want to stop this hemorrhaging,’ an official would later say,” states DART case study report. Pierluigi Paganini. SecurityAffairs – Emotet, malware).

Phishing 117
article thumbnail

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

This powerful technology and its massively scalable storage and operational power can crunch large sets of data, use analytics to understand it, and provide the security needed to lock it all down. There must be harmony between access to the information and control of the information. But this great power needs balance!

Cloud 125