Emerging Trends and Expectations in the Access Management Space

Doing by learning and learning by doing—it is not just an adage, but also a time-tested approach that leads to innovation, agility, and experimentation. That’s the work culture we at ARCON have espoused over the years. As a result, whatever we build or innovate, we continue to push the boundaries by embracing a doing by […]

Webinar-Paul Fisher and Anil Bhandari on Multi-Cloud Governance: Key Takeaways

ARCON and KuppingerCole once again co-hosted a webinar to discuss some of the most important issues in the Information Security space. On July 12th, 2022,  Paul Fisher, Senior Analyst, KuppingerCole Analysts AG and Anil Bhandari, Thought Leader and Chief Mentor, ARCON turned their attention to the role of Identity and Access Management (IAM) in multi-cloud […]

2022 Gartner® Magic Quadrant™ for Privileged Access Management

ARCON is proud to announce that, for the second year in a row, Gartner has named us a Leader in the Magic Quadrant for Privileged Access Management. In the 2022 Gartner Magic Quadrant for Privileged Access Management report, released in July 2022, ARCON has been recognized for its ability to execute and completeness of vision.  […]

The Key to Critical IT Resources

Overview Even as the IT community observed the ‘World Password Day’ on May 5, it is surprising and alarming that organizations keep on suffering data breaches due to the misuse of passwords. The idea of ‘World Password Day’ is to remind, reassess and rethink the password management policy in respective organizations.  On an individual level, […]

Mitigating the Privileged Access Risk with the ‘JIT’ Approach

An overview An IT infrastructure of any typical mid-sized or large organization includes hundreds or thousands of end-users who require daily access to systems for conducting several IT administrative and different operational tasks. How do the IT administrators ensure that the right person is accessing the right target system at the right time and for […]

ARCON | My Vault: Safe Storage for Enterprise Secrets

Remember the days when our grannies used to keep their secret savings or valuables in the typical iron chests and keep the keys under the mattress to hide the secrets from all? Both family members and outsiders visit grannies’ rooms for different purposes at different hours of the day, so it was necessary for the […]

Navigating Privileged Access Challenges with ARCON | PAM SaaS

The Context In the recent past, ARCON has witnessed a very robust demand for Privileged Access Management (PAM) solutions, especially for its full-blown Enterprise SaaS version including ARCON PAM SaaS Standard for SMBs. There are several emerging enterprise use cases that are boosting the demand for PAM SaaS adoption.  During the past 18 months, IT […]

Internal IT Frauds: Reasons & Remedies

Internal IT Frauds: Reasons & Remedies | Blog | ARCON

IT frauds could be disastrous for organizations if not curbed at the outset. According to a survey conducted by CFE (Certified Fraud Examiners), global organizations witness a 5% loss in their annual revenues due to internal IT frauds.  The major challenge is that proliferation of internal IT fraudulent activities typically go unnoticed and undetected for […]

IT Security Policy: Role in Preventing Cyber Threat

IT Security Policy: Role in Preventing Cyber Threat | ARCON Blog

In order to ensure safe and secure computing, storage and processing of data, organizations require a well-designed IT security policy. Several IT risks such as unauthorized access, data loss, credential abuse, data breach attempts, alteration of an organization’s information assets can be addressed through a good IT security policy. By having a well-defined IT security […]