Blog / News


Account management is also essential for IoT, application, and RPA

Identity Management (IM) is required to prevent attacks that log in with stolen accounts. It is necessary to integrate identities across business servers and applications, the clouds to reduce complexity and improve visibility through centralized control. Policies include deleting retiree accounts, reclaiming rights, and periodic password-changes, and applying Single Sign-On (SSO) to access multiple business applications and systems with one login to reduce ID management complexity and facilitate threat tracking and auditing.

Account management is not only for people, and accounts are also given to non-human factors such as IoT, various applications, and RPA. It is essential to establish ID management governance for large users, devices, and applications, determine authority, and ensure that they can be properly managed through change management. Automated change management and blocking should be supported so that ID management can be consistent even in multi-hybrid environments.

As IM’s complexity increases, services that automate ID management and change management in the cloud through ID as a service (IDaaS) and provide consistent control regardless of users and devices are also drawing attention. IDaaS should apply the concept of zero trust to ensure that security is not missed in the process of authentication and authorization.

HIWARE helps customers manage ID life cycles by creating and changing passwords automatically and maintains consistent security policies and prevents password leaks by implementing the policy of integrating passwords for heterogeneous devices. It is compatible with cloud environment as well as systems, active directory and data base.

[Source: Datanet]

Data Masking
18 Apr: Data Masking

Data masking, also known as data obfuscation, hides the actual data using modified content like characters or numbers. The idea behind data masking is creating another version of data that cannot be easily identifiable or reverse engineered, protecting data classified as sensitive.

Leave a comment