February 17, 2017, By Sam Adler
With over 40,000 people in attendance at the Moscone Center in San Francisco, Dr. Zulfikar Ramzan, CTO at RSA Security, kicked off the conference with the need for business-driven security and the challenges and opportunities that come with it. He added, “coming to RSA gives me hope—to connect with and learn from amazing people who are tackling some of the most important challenges of our time.”
January 25, 2016, By Yash Prakash
Over the last year, it has become evident that Identity Governance delivered as a Service (a.k.a. Cloud IGA) has not only picked up momentum but has become the first choice for many organizations. Gartner in its recently released report (subscription needed) on building Next-Generation Identity Governance infrastructure reiterated this trend.
January 25, 2016, By Yash Prakash
Segregation of Duties (SOD) is a fundamental building block to manage risk of internal fraud and error by requiring different people to perform different tasks in order to complete a business process. Modern enterprises operate in an environment where roles and tasks proliferate, business processes are rapidly changing, and regulatory environment is constantly evolving. This has resulted in managing and enforcing SOD principles a growing challenge for most enterprises.
December 22, 2016, By Vibhuti Sinha
Saviynt Security Manager has now added Privileged Access Management (PAM) to its AWS security offering with two key security design principles – “Who gets access to high privileged roles?” and “What did the high privileged users do with that access?”. Saviynt can help organizations to manage privileged access of their developers and administrators on these workloads.
December 13, 2016, By Sam Adler
It was one of the most exhilarating weeks we’ve had here at Saviynt, with 5 major consecutive events in one week, including the Gartner IAM Summit, the annual AWS re:invent Conference and 3 Evanta CISO/CXO summits across the country.
In the middle of it all, we invited about 600 of our closest friends to the opulent HYDE Lounge at the Bellagio Hotel in Las Vegas, overlooking the incredible Bellagio Fountains. We co-hosted the event with Deloitte.
November 29, 2016, By Vibhuti Sinha
This blog series aims to discuss key security challenges for native AWS Services which Saviynt faced when implementing its offerings on AWS. The blog also intends to share our learnings, design patterns and methodologies used to overcome these challenges. Saviynt with its vision to provide comprehensive Cloud Access Governance and Intelligence have built these security controls within its core platform and uses the same to secure its offerings on AWS.
November 28, 2016, By Vibhuti Sinha
Adopting any new technology/platform comes with a learning curve for any organization and Saviynt was no exception to it. As part of Saviynt’s Cloud Adoption, we went through the typical “Crawl, Walk and Run” learning curve and are currently between the “Walk” and “Run” phases. This is a 2-part blog post and aims to explain some of the Architectural processes and patterns Saviynt has adopted and refined over a period of time on its journey to AWS.
November 16, 2016, By Yash Prakash
When considering an Identity Governance and Administration (IGA) solution for your business, how important is a smooth and intuitive user experience? It’s a more critical part of your security strategy than you might think. In fact, according to Gartner’s Magic Quadrant for Identity Governance and Administration, businesses in a wide range of industries and verticals consider a high-quality IGA user experience to be one of their most important criteria for selecting an IGA platform. Here’s why your business should make it a priority when evaluating IGA solutions.
August 27, 2016, By Vibhuti Sinha
Adoption of Cloud Infra services, moving workloads to AWS, Azure or any other Cloud Infra Services is ubiquitous and inevitable. Organizations are either in the process of moving to Cloud, already moved to Cloud or planning to move to Cloud.
August 20, 2016, By Vibhuti Sinha
This blog post aims to share the challenges for privileged access management and monitoring in an AWS Ecosystem, our unique set of learnings and also the solutions which were designed to solve them
August 18, 2016, By Vibhuti Sinha
AWS IAM Policy and IAM Roles lay the foundation and form the core of “Access” on AWS objects. From an Identity Governance and Administration view , AWS Policy and Role objects are fine grained entitlements and thereby should follow and adhere to entitlements lifecycle processes.
August 15, 2016, By Sam Adler
We were privileged to be a sponsor at the AWS Summit in NYC last week and threw an awesome party at The Press Club, a swank rooftop bar overlooking Manhattan. To check the pictorial recap of the event, please click on the header above and check out how we ‘Identify a Party’.
August 10, 2016, By Yash Prakash
Identity Governance is so fundamental to security that you see most organizations attempting to address this with one or more solutions. Despite significant investment of time and money for several years, we see organizations continue to struggle with their IGA implementation. The maturity is usually so low that only a handful of applications are integrated, while the portfolio has hundreds of applications. Poor user experience further limits adoption and results in rubber stamping and excessive access, opening the door for potential data breach.
August 4, 2016, By Sam Adler
Over the last 6 years we have been hard at work building out an amazing set of tools that some of the largest companies in the world are now using to manage their Identity Management and Administration, their Cloud Security, and much more. As companies begin to migrate their legacy systems to be able to handle the provisioning and…
Subscribe to Saviynt updates.