Background

on security topics

Modiam and Zero Trust

As we state in our vision on security, a good zero trust infrastructure stands or falls with security at the top of the...

Vision on security

Working more and more digitally and conducting digital transactions, the digital transition, has been accelerated by the...

Our approach

We help you set up Identity Management from policies to management. Capitar Security uses a proven standard phasing for...

PAM Checklist

Many PAM projects start with the question: “Which PAM product should we purchase?”. To avoid disappointment...

PAM Selectie Matrix

When an organization has made the decision to implement a PAM tool, it is important to source the right supplier. There...

PAM, everyone needs to have it

PAM, you hear about it more and more. Everyone must have it.

I also think that it is true for almost every organization....

PAM needs PIM

The term ‘PAM’ is interpreted differently by different people, and by different companies. Everyone agrees...

How do we deliver Modiam?

How do we deliver Modiam? The solution to your puzzle Based on the solid IAM software of Micro Focus, we have realised a...

Need to NOT know

In vision and policy documents on information security and plans for improving information security, I regularly come...

MFA

Now that we all know for sure that passwords lead to insecure situations we would like to apply MFA in our organization....

Always immature

I too have done it before: developed a maturity model. In my case for the management of electronic identities, digital...