ARCON recognized as a Customers’ Choice in the Gartner Peer Insights 'Voice of the Customer' for Privileged Access Management. Read More





Managing IT Risks in CSP Environments

The Impending Risk in CSP Environments It is very important for organizations to think, analyze and peruse the IT security factors of a Cloud Service Provider (CSP), which possesses every possible sensitive detail of an organization’s IT resources. Indeed, the cloud managers literally have complete control over the cloud infrastructure, even as the IT security staff has to manage and control not only the cloud console admins but also the various kinds of identities that access a host of applications and development platforms.  Recently, a former engineer from one of the leading CSPs was found guilty of hacking into more [...]

Posted On | 24-06-2022
Privileged Accounts, Data Breach

Cloud Services Adoption: Urgent Requirement for Regulatory Guidelines

According to Gartner, worldwide end-user spending on public clouds could reach almost $500 billion in 2022. In addition to the financial benefits (cost effectiveness), cloud computing offers more scalability, flexibility, mobility, and operational efficiency. For various reasons, it is very obvious that storing and analyzing data on the cloud is at the core of digital transformation. And that’s why Indian commercial banks want the regulator, the Reserve Bank of India (RBI) to lay down a clear set of security and compliance guidelines that would allow Indian banks to adopt cloud computing in a big way.  Grappled with falling margins, accumulating [...]

Posted On | 10-06-2022
Privileged Accounts, Data Breach

Reinforcing the IAM Fabric for Digital Innovation

From a wide range of merchant payment providers to peer-to-peer lending platforms, payment gateways have come a long way to remodel the financial services space. Thanks to technological advances, there is a complete transformation of the ways we manage our finances.  Financial innovation has ushered financial inclusion. Indeed, different digital payment modes have not just opened a sea of options in front of us but also eased our lives beyond ATM machines and cash transactions. We have mobile apps to check, update or transfer money through mobile banking. We have e-wallets to ease our payment processes in e-commerce platforms and [...]

Posted On | 27-05-2022
Privileged Accounts, Data Breach

Zero Trust, Controlled Privileges and Data

ARCON has always propagated the message of controlling and protecting the inner realm of an organization’s IT network. It builds the foundation for robust cybersecurity.  Whether the cyber-criminal sits outside the realm or is present inside the periphery, typically it is the compromised insider-privy to confidential information- who is behind an insider attack or cyber-espionage. Recently approximately thirty (30) multinational companies faced the wrath of state-sponsored actors. The incident has brought to the forefront yet again the dire need to adopt robust access management methods to prevent the theft and exfiltration of sensitive data.  What exactly happened? A report published [...]

Posted On | 24-05-2022
Privileged Accounts, Data Breach

Critical IT Infrastructure: Time to Push the Alert Button

Overview It is not uncommon that critical systems are often targeted by cyber criminals. And we have documented it from time to time. But this time the attack was on toll collection systems.  Indeed, gone are those days when you take out your wallet to pay highway tolls while driving through the city suburbs. Today the latest technologies are adopted at the highway tolls for making the payment process fast and easy. With the help of the Radio Frequency Identification (RFID) technology, toll payments are made directly while the vehicle is in motion. A device is affixed on the windscreen [...]

Posted On | 27-04-2022
Privileged Accounts, Data Breach

Identity and Access Control: Must for Digitization

The global digital workspace is expanding at rapid pace and by 2020 most of the organizations would take the path of digitization worldwide. Simultaneously, types of security breaches are getting sophisticated day by day and CSOs, CISOs or CIOs of these organizations are on their toes to maintain a robust security framework to keep data theft at bay. The cyber crooks are even eyeing on newer ways to take illegal hostage of the privileged accounts and eventually access confidential information and records. Today, managing data is one of the biggest challenges of the organizations especially in a shared and distributed [...]

Posted On | 25-06-2018
Privileged Accounts, Data Breach

Small Mistakes can erode Social Media’s Amazing Influence

Social Media: who would have thought about a decade ago thata host of websites and applications that allow social networking, will become a core part of our daily life? Indeed, from running all sorts of promotional campaigns to familiarizing brand/products and from putting forward your thoughts on current affairs to finding your long-lost friends, social media’s reach and benefits are boundless. Having said that; it also makes us extremely vulnerable in an ever-increasing digitized world, something which, Mark Zuckerberg, founder and CEO of Facebook learned it the hard way. He fell victim not so long back to a hacking group, [...]

Posted On | 28-09-2016
Privileged Accounts, Data Breach

Select Category