Welcome!

Log Management Authors: Dana Gardner, Pat Romanski, Elizabeth White, David H Deans, Carmen Gonzalez

Press Release

Revealing Cloud-Driven Best Practices

You're invited to our May 22 Webinar: "One Click...From Directory to Cloud"

Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud-based security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources.

The 45-minute presentation, titled "One Click...From Directory to Cloud," and scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, "What if you could add a user from any directory or database and it shows up automatically in Google Apps, salesforce.com, any SaaS or legacy application?" Accomplishing this has long been a difficult, but necessary goal for companies needing to protect assets using identity and access management.

“Because every user has a unique relationship to a company’s IT environment, it is mission critical to develop process and technology best practices to streamline and fully integrate the separate functions and capabilities,” said CloudAccess CEO Kevin Nikkhoo. “We want to share how the cloud is the best platform on which to base that initiative.We want to prove something that many CIO's and CTOs think too good to be true.”

For many companies identity and access management are separate solutions that regulate who is allowed on a network and what applications, web portals or data they are permitted to use. This includes managing passwords, accountability monitoring and reporting, user provisioning, and encrypting data. Several industries require these components to meet regulatory compliance (HIPAA, PCI, SOX, etc) and privacy laws.


“Compliance is not only important for industry standards, but maintaining trust between employees, customers and other online users. It’s important to discover and deploy best practices that mitigate the burden, limit the man hours, reduce the capital expenditures,” Nikkhoo said. “But most importantly, it is to secure the privacy of sensitive assets and protect the IT enterprise from hackers, data leaks and other costly security issues.”

For many, this technology (identity and access management) is not new, but the seamless integration between the capabilities managed and deployed from the cloud is unique. There are cloud-based solutions and solutions that monitor the cloud, but in most current initiatives, one or both of the solutions are on-premise. The demonstration portion of the webinar will focus on a completely cloud-driven solution and its enterprise capabilities.

Additionally, the presentation will include a best practice that is not limited to controlling federated SaaS applications (SAML). It is expanded through a wide-ranging identity gateway that allows the control over any web or legacy application, and any website asset.

According to Nikkhoo, the ability to deploy and manage these rules processes in the cloud is the key to reducing man hours, compliance burdens and, most of all, capital expenses.

“A strong cloud strategy is the central best practice for a company looking to maintain a secure edge,” he said.

To register for the webinar, visit the CloudAccess registration site www.cloudaccess.com/webinar-registration-0. Seating is limited. All attendees will receive the white paper Regaining IT Control. For more information about security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com.

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

IoT & Smart Cities Stories
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...