The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Kevin Nikkhoo

If you want the secret to user provisioning and de-provisioning in an enterprise setting, I’ll give you the one word answer, and then you can get on with the rest of your day… Integration. However, if you need to know why, how and with what...read on. The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper rights in…and all others out. Complicating matters is that there are so many users these days…employees, channel partners, contract employees, suppliers, vendors, customers, prospects--all needing some sliver of access. Further muddying the water is that each of the mentioned user types are not all equal. Consider employees. Do you want your junior admin assistant to have access to payroll information or other files type specifically aimed at senior executives? The volunteer coordinator at... (more)

Do You Want to Know What You Don’t Know?

In my experience there are two types of enterprise IT departments: those that maintain the status quo and those looking to continuously explore and improve. It is truly unfortunate how many fall into the former category.  But the problem with IT security is that it's an ever-evolving and moving target. So the decision to not dip your toe in the water and understand all available options could mean the difference between a panicked 3am call regarding a breach alert or a good night’s sleep. I realize this is an over generalization, and oftentimes the decision to “stay the course”... (more)

So, Just What Is REACT? And How Does It Change Security Strategies?

Last month, I published an article about a new unified security platform called REACT (Realtime Event & Access Correlation Technology).  All in all, it received some very positive notices, but also raised some questions as to what exactly the platform is, and why it should matter. Simply put, REACT is an approach whereby an organization leverages the capabilities of several security solutions into one central correlated repository of security intelligence. For instance, key information from an Access Management tool (such as SaaS SSO logins or views of/modifications on/additions... (more)

Governance Must Drive All Security Initiatives... Even Cloud

“The ‘how’ may change, but the ‘what’ is fundamental to risk management.” I heard these sage words at a recent ISSA (Information Systems Security Association) meeting from a CIO speaking about security from the cloud. He continued, “Risk is not unique to the cloud. It experiences the same issues that affect any outsourcing or third party deliverable. It is bounded by the same concerns regarding governance—does it meet the requirements of my industry? Is my data free from co-mingling? Are the proper notification protocols in place?” Do a Google search on “cloud security” and the ... (more)

Revealing Cloud-Driven Best Practices

Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud-based security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources. The 45-minute presentation, titled "One Click...From Directory to Cloud," and scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, "What if you could add a user from any directory or database and it s... (more)