Dean Wiech

If Not Managed Correctly, The Cloud Can Cost An Organization

By Dean Wiech | October 12, 2016

Cloud Application Management When organizations implement cloud applications, they do so as a means to be more efficient and in the hopes of saving a great deal of money. What many organizational leaders often don’t realize is that they need

Ensuring Cloud Authorizations Are Correct

By Dean Wiech | September 6, 2016

Cloud Authorization Almost all organizations in every industry now use some type cloud application. This is because of cost, efficiency, ease of use and because many software companies are offering their solutions in the cloud. For example, Microsoft 365 and

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

By Dean Wiech | August 8, 2016

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It

Steps To Ensure A Successful Cloud IAM Environment

By Dean Wiech | July 13, 2016

Cloud IAM Environment Sales and implementations of identity and access management (IAM) solutions have drastically increased over the last couple of years as the solutions have become the standard bearer for organization’s access and security. This is primarily because organizations

Cloud Access Management: Access Everywhere

By Dean Wiech | June 20, 2016

Cloud Access Management As the utilization of cloud applications has become a standard of using in nearly every industry, there needs to be solutions available to help manage these applications. One way for admins to effectively manage their organization’s applications

Taking Your Access Governance Processes To The Cloud

By Dean Wiech | May 2, 2016

Access Governance Access governance is a growing market in many different industries across the United States and beyond. Companies are investing money in access governance solutions to efficiently improve processes and ensure security of their networks, without a great deal

Automation of Access Management Means a Happier IT Staff

By Dean Wiech | April 6, 2016

Automation of Access Management One of tasks that your IT department probably really dislikes is managing the in-house and cloud user accounts and passwords for all of the employees in the company. Though this is usually an easy task, it

Jargon Free: The Three Real Main Benefits of Cloud IAM Solutions

By Dean Wiech | March 8, 2016

Main Benefits of Cloud IAM Solutions There are significant discussions concerning cloud applications and software solutions, such as identity and access management (IAM) solutions, which are used in conjunction with them. These articles often discuss complex technical reasons and benefits,

Managing Cloud Applications Among The Business Regulations

By Dean Wiech | February 15, 2016

Managing  Cloud Business Regulations Cloud applications must be managed in a way that complies with the many different government standards in the United States. As more cloud applications are being implemented in businesses of every industry, companies need a way to

The Importance Of Cloud Password Management

By Dean Wiech | January 4, 2016

Cloud Password Management A very obvious trend over the past few years has been organizations moving their business applications to the cloud. This trend has been talked about over and over again, including the benefits, drawbacks, implementation hurdles, etc. So

POPULAR

Machine Learning Is The New Proving Ground For Competitive Advantage

Machine Learning Is The New Proving Ground For Competitive Advantage

Machine Learning Is The New Proving Ground 50% of organizations are planning to use machine learning to better understand customers ...
Big Data Gives Insight to Consumer Trends

Big Data Is a Competitive Advantage in Any Industry

Big Data Competitive Advantage The various ways major companies — and even entire industries — have begun utilizing methods to ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Cashless Society Part 2: Pros and Cons

Cashless Society Part 2: Pros and Cons

The Cashless Society Having looking at our movement towards a cashless society in Part 1, I thought we should turn ...
AI In Telecom: Intelligent Operations is the New Norm

AI In Telecom: Intelligent Operations is the New Norm

Intelligent Operations The move towards an intelligent world is faster and more rapid than it ever was before. The increase ...
Cloud Architecture

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to ...
Part 1 - Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even ...
How To Be Data Compliant When Using The Cloud

How To Be Data Compliant When Using The Cloud

Data compliant Companies using the cloud for data storage, applications hosting or anything else, have to carefully consider data compliance ...