Benefits of Streamlining Access Recertification
Written By : Abhi Kumar Access recertification is a nightmare for any organization looking to fulfill SOX, HIPAA, ISO27001, GDPR, or PCI compliance. With expanding IT stacks, limited resources, and increased scrutiny—it’s more important than ever to increase internal security and build scalable, repeatable processes. …
Identity as the New Perimeter: The Importance of Regular User Access Reviews
Written By: Abhi Kumar The term “identity as the new perimeter” refers to the notion that the traditional network perimeter, which was once the primary focus of security teams, is no longer an adequate means of protecting the sensitive data of an enterprise. The changing …
Securing Privileged User Accounts : 5 Tips From The Trenches
Written By: Abhi Kumar User accounts are an essential aspect of today’s IT applications and systems, and privileged user accounts are the most powerful of user accounts. Privileged access is often allowed to a small number of persons depending on their jobs and in compliance …
Manual User Access Reviews are Scary
Written By : Abhi Kumar It’s that time of year again—Halloween! And what could be more frightening than a manual user access review? User access review is an essential component of the access management process. It helps organizations meet compliance mandates for SOX, FFIEC, HIPAA …
See Yourself In Cyber: Phish On
Written By : Abhi Kumar October is Cybersecurity Awareness Month. Since 2004 Cybersecurity and Infrastructure Security Agency (CISA), National Cybersecurity Alliance (NCA), and the industry has come together to raise awareness about digital security and empower everyone to protect their personal data from digital forms …
Identity Governance and Service Accounts
Written By : Abhi Kumar WHAT ARE SERVICE ACCOUNTS? Service accounts are a special kind of non-human account that are often used with the intention of automating a wide variety of different system functions. They have their own unique set of permissions and privileges. Service …
Why it’s Time to Democratize User Access Reviews
Even for the most streamlined organizations, the process of collecting a list of users, roles, and permissions across all systems then correlating user identities to accounts, assigning reviews to managers or application owners, and resolving or remediating all violations is anything but easy. …
Celebrating Identity Management Day with SecurEnds
ATLANTA (PRWEB) APRIL 05, 2022 SecurEnds, Inc. announced that it will participate in the second annual ‘Identity Management Day,’ an annual identity and cybersecurity awareness event that will take place on April 12, 2022. Founded by the Identity Defined Security Alliance (IDSA) and supported by the National Cybersecurity …
Compliance Challenge: Manage Employee Transition
With recent upheaval in the workforce, transitions to distributed and remote teams, and The Great Resignation; organizations of all sizes should be reviewing and establishing their termination and transition processes. IT admins in an organization are typically responsible for securing data, managing access to resources, …
Atlanta, GA – February 24, 2022 – SecurEnds Inc, We’re pleased to announce that Subba Ayyagari joins Jeremiah Daly, Christopher De Souza, and Tippu Gagguturu on the SecurEnds Board of Directors. As Chief Technology Officer with Black Knight, Subba brings extensive leadership and strategic experience …