Modern IT Infrastructure demands Low Friction and High Security

ARCON’s marathon with the virtual summits continues! To expand IT security awareness among global enterprises amid digital transformation, ARCON participated at the CIO Axis Roundtable Summit 2020 on 20th August 2020. Mr. Anil Bhandari, the Chief Mentor of ARCON was the speaker of a keynote session discussing the transformation of the current state of cybersecurity […]

ISACA and ISOG: Key Takeaways from Two Major online IT conclaves

ARCON created quite a buzz in a couple of back to back virtual global events recently. The keynote sessions by Mr. Anil Bhandari, the Chief Mentor of ARCON, on both the occasions added immense value to the knowledge-sharing and learning platforms. Here is a brief account of the sessions. On 29th July 2020, ARCON shared […]

ARCON hosts exclusive webinar for East Africa on Privileged Access Management

On 28th July 2020, at 11:30 am EAT, ARCON Tech Solutions organized an exclusive webinar for the East Africa region. The topic was: Predict, Protect, Prevent: Modern Security Paradigm for Modern Enterprises. 150+ attendees from India, Kenya, Nigeria and South Africa attended the webinar. Aditi Jain, from the product development team, represented ARCON and delivered […]

Banyan Tree and Privileged Accounts: Tales of two uncontrolled expansions

Have you ever heard about 250 years old ‘The Great Banyan Tree’, in the AJC Bose Botanical Garden, Kolkata, India? The vastness of the tree is almost the size of a Manhattan city block with 80 ft high and an area of 14,500 square ft. The number of roots and prop-roots of this banyan tree […]

What’s so common between the kingdoms and IT ecosystems?

Do you remember the infamous historical character from the battle of Plassey? The chief commander of the Nawab of an East Indian province became an embodiment of betrayal after the historic loss in the battle. The culprit misused the blind trust and faith that his nawab kept on him and eventually allowed the British troops […]

Secure Privileged Access: A top priority for seamless digitalization

Revolutionary technologies such as Internet of Things (IoTs) and cloud computing, AI, Big Data, et al have created enormous opportunities for global organizations. They have changed the way global corporations conduct business. While these technologies create new opportunities, they also make IT assets vulnerable. Indeed, with tons of data stored in the cloud, and critical […]

ARCON rated as Innovation Leader

KuppingerCole recently published its “2020 KuppingerCole Leadership Compass for Privileged Access Management (PAM)” report and ARCON has been recognized as an Innovation leader by Paul Fisher, the lead analyst. This independent analyst firm from Europe has identified Privileged Access Management (PAM) as one of the crucial components of IT security and risk management in any […]

The changing IT security paradigm amid COVID-19

As global organizations grapple with COVID -19 pandemic and the economic uncertainty arising from lockdown, IT security is becoming increasingly a matter of concern. The Security and Risk Management (SRM) pros are on their toes to strengthen their organizations’ digital resilience to combat unexpected disruptions in the business process. Any cyber attack or insider mischief […]

Privileged Access Management a must to maintain Digital Trust

Digital technologies have spurred innovation and brought a sweeping transformation in the way businesses and government organizations administrate day-to-day operations. It’s altering our lives, bringing people closer whilst it has opened up new avenues for today’s organizations to add value to business, increase productivity, and grow at a faster pace. According to the World Economic […]

Reduce your insurance premium on your Cyber policy

At the onset, we would like to say that Cyber Insurance is no substitute for cybersecurity defense. The Organization has to be in top gear on cybersecurity to ensure that all the assets of the organizations are safe from any unwanted event. However, in the unlikely event of an event occurring, having a cyber policy […]

Request A Demo

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.

Become A Partner

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.