Just-In-Time Access: Boon or Bane?

Ensuring right access for right users to right resources is always business-critical. While organizations have evolved in making better use of technology, cybercrime evolves too. Ever-increasing threats demand continuous upgrades and new types of controls to improve cybersecurity posture. Most organizations still follow “standing privileges” approach. In the case of critical systems and applications, permanent…

Once an Orphan Account, Always an Orphan Account?!

Ensuring continuous governance around “who has access to what” is a critical requirement for organizations. This is usually achieved through implementing an Identity Governance and Administration (IGA) solution. Users are mapped to accounts through a set of pre-defined rules. While mapping user to a single primary account is easily managed, complexities arise when a user…