Background

on security topics

Modiam and Zero Trust

As we state in our vision on security, a good zero trust infrastructure stands or falls with security at the top of the zero trust stack: the identities. One trend in the market is to break down...

Vision on security

Working more and more digitally and conducting digital transactions, the digital transition, has been accelerated by the Corona crisis. It seems that we are not going back to the way things were. This...

Our approach

We help you set up Identity Management from policies to management. Capitar Security uses a proven standard phasing for the design, implementation and management of IAM environments. We see an...

PAM Checklist

Many PAM projects start with the question: “Which PAM product should we purchase?”. To avoid disappointment and unnecessary costs, it is wise to go through the questions below and only...

PAM Selectie Matrix

When an organization has made the decision to implement a PAM tool, it is important to source the right supplier. There is a variety of capabilities that are grouped under the heading...

PAM, everyone needs to have it

PAM, you hear about it more and more. Everyone must have it.

I also think that it is true for almost every organization. You have to have something that guards your risky permissions in these times of...

PAM needs PIM

The term ‘PAM’ is interpreted differently by different people, and by different companies. Everyone agrees on the ‘P’ and ‘M’: ‘Privileged’ and...

How do we deliver Modiam?

How do we deliver Modiam? The solution to your puzzle Based on the solid IAM software of Micro Focus, we have realised a modular solution that closely matches the IAM puzzle pieces described here:...

Need to NOT know

In vision and policy documents on information security and plans for improving information security, I regularly come across the winged term “Need-to-know. The term is often taken so much for...

MFA

Now that we all know for sure that passwords lead to insecure situations we would like to apply MFA in our organization. Most users already know this from their Google, Microsoft or iCloud account....

Always immature

I too have done it before: developed a maturity model. In my case for the management of electronic identities, digital access and access rights, or in short Identity & Access Management (my daily...