The ABC of Enterprise Mobile Management (EMM)

Mobile Device Management (MDM) has rapidly expanded into EMM (Enterprise Mobile Management). The rapid growth and all pervasiveness of mobile devices has led to a significant expansion of domain. EMM comprises of: Mobile Device Management (MDM) has a user configuration profile & OS level controls – MDM has highly used device lifecycle management that can […]
Tips on Gartner’s Magic quadrant (MQ) vs Critical Capabilities Matrix in Access Management

Critical Capabilities matrix rather than MQ should be looked upon first if you are shortlisting a technology. MQ vendors may not be great in certain areas (Example: Geography like Asia-Pacific, less than 5000 employees etc) Legacy application coverage is a differentiator. Banking & Govt. are finally just about beginning to adopt cloud single sign-on & […]
Enterprise Mobile Management

As we are all aware Mobile Device Management (MDM) has rapidly grown into Enterprise Mobility Management (EMM). It comprises of MDM, MAM (Mobile Application Management) MCM (Mobile Content Management) and mobile Identity (to ensure trusted device/user Access, Certificate Management and SSO). Some quick facts about vendors: CISCO: a low-cost solution Nation Sky: a relatively unknown […]
Dreaming the Ultimate IDAAS

We are a small company with less resources than perhaps a tiny business unit of IBM. But that does not deter us from dreaming big. We are committed to change the way Identity Management is seen, implemented and supported. We have existed for 17 years with one dream: To enable the world, its people and […]
Cross Identity (Formerly Ilantus) ARaaS – Standard Access Review Service Package

Features Details Who has Access to What Centralized view of users and their access Intuitive administrative dashboards deliver information with summary of key usage and activity statistics Access Recertification Up to four access recertification campaign to perform user access certification with maintain revoke capabilities on user’s and access Closed Loop Remediation Manual revoke/disable of target […]