Petteri Ihalainen

As Gartner IAM Summit Spotlights Identities, New Survey Sizes The Challenge

By Petteri Ihalainen | March 26, 2015

Gartner IAM Summit The Gartner IAM Summit in London last week put the spotlight on digital identities and how best to morph standards and infrastructures to support both people and things, commonly referred to as the Internet of Everything (IoE).  

Resolved: Username/Passwords Alone MUST Go

By Petteri Ihalainen | January 14, 2015

Username/Passwords MUST Go New Year’s Resolution #1 for any cloud IT deployment manager in 2015 ought to be that the user name/password alone must go.  High-profile breaches that exploit username and password-only authorization systems are becoming all-too-frequent events.   The Syrian

Turning Identity Inside and Out: IAM Meets The Extended Enterprise

By Petteri Ihalainen | December 10, 2014

IAM Meets The Extended Enterprise Company boundaries are blurring as businesses interact closely and utilize online services in growing numbers. Business ecosystems include different stakeholders including customers, partners, and subcontractors to owners and investors. Each stakeholder has their own business

POPULAR

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...