From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.
Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.
Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.
The multifaceted alliance offers customers FireEye Network Security combined with the GigaSECURE Security Delivery Platform with flexible deployment options and scalability.
At Choice International, Amit Jaokar led a Cloud based Identity and Access Manager (IdAM) solution to optimize information security and risk management, and achieve regulatory compliance faster. It reduced administrative costs by 20 percent, automated account management by 85 percent, reduced helpdesk calls by 90 percent, and reduced user on-boarding time by 75 percent.
Pawan Kumar Sharma, as CISO at Tata Motors, is driven by his goal to align information technology with business to add maximum business value and realize maximum benefits in terms of process improvement, automation and cost optimization in the organization.
At Reliance Nippon Life Asset Management, Fal Rameshchandra Ghancha implemented a robust IdAM solution that fully automate the provisioning and de-provisioning of access rights of employees, partners, contractors, vendors, and guests—for critical applications hosted on the company's own data centers, private clouds, public clouds, or a hybrid combination of all these spaces.