on security topics
As we state in our vision on security, a good zero trust infrastructure stands or falls with security at the top of the...
Working more and more digitally and conducting digital transactions, the digital transition, has been accelerated by the...
We help you set up Identity Management from policies to management. Capitar Security uses a proven standard phasing for...
Many PAM projects start with the question: “Which PAM product should we purchase?”. To avoid disappointment...
When an organization has made the decision to implement a PAM tool, it is important to source the right supplier. There...
PAM, you hear about it more and more. Everyone must have it.
I also think that it is true for almost every organization....
The term ‘PAM’ is interpreted differently by different people, and by different companies. Everyone agrees...
How do we deliver Modiam? The solution to your puzzle Based on the solid IAM software of Micro Focus, we have realised a...
In vision and policy documents on information security and plans for improving information security, I regularly come...
Now that we all know for sure that passwords lead to insecure situations we would like to apply MFA in our organization....
I too have done it before: developed a maturity model. In my case for the management of electronic identities, digital...