By Kevin Nikkhoo  Cobbling together point solutions provides tools, but doesn't promote the key collaborative intelligence integrated cloud-based unified security offers.
Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the ... Mar. 28, 2014 11:00 AM EDT Reads: 7,909 |
By Kevin Nikkhoo  Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps.
The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the... Feb. 7, 2014 10:00 AM EST Reads: 5,627 |
By Kevin Nikkhoo  Identity Management (IDaaS) & Access Mgmt (SSO) solve similar but separate issues, but both serve as a cornerstone of an integrated security initiative.
One of the biggest misconceptions in cloud security is the perception that identity management (IDaaS) and access management (SSO) a... Dec. 7, 2013 03:00 PM EST Reads: 6,022 |
By Kevin Nikkhoo  Security-as-a-service provides the necessary ingredient to transform continuous monitoring from compliance mandate to best practice: real time monitoring.
Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I l... Nov. 25, 2013 08:00 AM EST Reads: 5,124 |
By Kevin Nikkhoo  A cloud security take on an old riddle: analyze risks, identify needs, develop priorities, deploy scalable model, and leave room for dessert.
Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a... Nov. 4, 2013 02:00 PM EST Reads: 8,465 |
By Kevin Nikkhoo  Despite accusations against the gov't of data harvesting and privacy invasion, IDaaS is a feasible and trustworthy option to maintain identity protection.
Conspiracy theorists and other concerned citizens will insist the government is watching every keystroke, keeping a record of ever... Oct. 22, 2013 10:45 AM EDT Reads: 5,711 |
By Kevin Nikkhoo  Stats show risk grows in disproportion to IT security readiness. Security deployed, managed from the cloud provides strong results.
How cloud security overcomes the obstacle. It’s simple, really. More bang for the buck. Using the ability to apply operation expenses over capital ones ... Oct. 7, 2013 04:00 PM EDT Reads: 7,467 |
By Kevin Nikkhoo  Asserting control of the IT environment through collaborative and integrated identity and user access strategies create the necessary visibility.
Security is not an all-or-nothing proposition. And that’s part of the problem. It creates blind spots; gaps in vulnerability. Partly becaus... Sep. 27, 2013 09:00 AM EDT Reads: 6,678 |
By Kevin Nikkhoo  Strong InfoSec strategies must answer the key questions of who is logging in, what is accessed, when was it changed and how is the IT landscape affected.
Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implicati... Sep. 14, 2013 10:00 AM EDT Reads: 6,747 |
By Kevin Nikkhoo  The major retailer BCBG migrated to a cloud security platform and discovered the CloudAccess'SIEM and Log Management capabilities enhanced their abilities for enterprise security.
There was a time the only security issues retailers needed to be concerned with was theft. Put a guard in... Sep. 1, 2013 03:00 PM EDT Reads: 6,586 |
By Kevin Nikkhoo  Restaurants, food service orgs feel the sting of security breaches via POS integration..ask Raleys, Schnucks, Subway, Zaxbys aned many others. Affordable real time monitoring must become a key priority.
I love sushi. I love big fat burritos. I love tikka masala. So now that my taste b... Aug. 23, 2013 04:00 PM EDT Reads: 6,323 |
By Kevin Nikkhoo  More than fines and reparations, intrusion Security significantly impacts customer retention. Damage done to brands because users don't trust doing business with that company is staggering.
In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a ... Aug. 6, 2013 10:12 AM EDT Reads: 4,750 |
By Kevin Nikkhoo  Want the secret to user provisioning/de-provisioning in an enterprise setting, The one word answer,…Integration.The question is why, how & with what?
The need to credential authorized users to your network and other proprietary assets is clear. You only want those with the proper righ... Jul. 28, 2013 05:00 PM EDT Reads: 8,526 |
By Kevin Nikkhoo  For many companies with whom I talk, there isn’t a lack of IT talent when it comes to security--just a lack of hours in the day, computing resources and necessary headcount with specific expertise to change the culture from reactive to proactive and strategic risk management. Executive... Jul. 16, 2013 11:00 AM EDT Reads: 6,841 |
By Kevin Nikkhoo  Access policies must be a part of any company’s risk assessment and security policy because unsecured, unmonitored access by former employees can only lead to trouble.
Earlier this month I attended a local cloud developers group, and I met a gentleman who consults with companies to e... Jul. 5, 2013 09:45 AM EDT Reads: 8,856 |
By Kevin Nikkhoo  Regulatory compliance remains a critical and strategic business need for most companies. And, the issues are clear. The layers of IT security necessary to address the myriad of audits, reports and processes are typically expensive. The expense is not limited to the technology applicat... Jun. 21, 2013 09:30 AM EDT Reads: 2,724 |
By Kevin Nikkhoo  Precautions to safeguard client data & infrastructure is an MSPs responsibility-this extends beyond client's sphere of access to MSP employees & consultants. MSPs must employ some degree of security to cover their own access, not just that of their clients.
A man walks into the doctor... Jun. 21, 2013 08:00 AM EDT Reads: 5,318 |
By Kevin Nikkhoo  The cloud will soon supplant on-premise security initiatives. IT is at a crossroads: the acceptance of cloud-based computing as the chief business driver.
Erasmus Wilson, the celebrated Oxford professor once proclaimed, "When the Paris Exhibition [of 1878] closes, electric light will ... Jun. 8, 2013 01:00 PM EDT Reads: 10,718 |
By Kevin Nikkhoo  CloudAccess is hosting a free webinar titled: "One Click...From Directory to Cloud" on May 22 and May 28th at 11:00am to address best practices associated with user provisioning, password management, multi-factor authentication, application gateways and single sign on (sso).
Effective... May. 10, 2013 12:55 PM EDT Reads: 7,858 |
By Kevin Nikkhoo  One of the established best practices in InfoSec is monitoring. People, products and companies get paid a great deal of money and expend a great deal of resources to watch pots. Monitoring simply is the central component to any security initiative. But with all best practices, there ar... May. 2, 2013 12:48 PM EDT Reads: 6,490 |
By Kevin Nikkhoo  Security-as-a-service leader is first to the cloud-based market with a security solution that combines the key capabilities of user credentialing and authentication with single-sign-on for both SaaS and legacy applications.
CloudAccess, a provider of unified security solutions from th... Apr. 26, 2013 02:09 PM EDT Reads: 6,261 |
By Kevin Nikkhoo  Network perimeters are all but erased and traditional security strategies such as stacking don't adequately address the current needs of a modern enterprise. Many companies are still using strategies rooted in 2002 technologies and approaches. The new intelligence-based security model ... Apr. 22, 2013 10:00 AM EDT Reads: 8,424 |
By Kevin Nikkhoo  Implement the predictive analytic process that is designed to assess/score risk attributes during authentication so that Access Management can determine whether to require the user to complete further authentication steps.
Does this sound familiar? Ann, sitting at her desk eating lun... Apr. 8, 2013 09:30 AM EDT Reads: 8,632 |
By Kevin Nikkhoo  The Who asked ultimate Access Management question..."Who Are You?" So do we listen to Paul McCartney said and "Open the door and let 'em in" or kick them to curb as the Stones suggest..."Hey You, Get off of my Cloud" The answer is different for each organization because, not every empl... Mar. 25, 2013 09:00 AM EDT Reads: 5,972 |
By Kevin Nikkhoo  Securing your IT environment is not free, but there are new (cloud) options designed to mitigate costs while still providing a strong, manageable and proactive defense. While many companies still would rather spend capital on commodity assets, many CIOs recognize that information secur... Mar. 15, 2013 11:45 AM EDT Reads: 12,229 |
By Kevin Nikkhoo  Before you add another decimal place to security budgets, maybe it’s time you consider the how cloud-deployed security options can not only address the complexities of enterprise security ably, but do so at considerable savings.
With all the talk of fiscal cliffs sequestrations, finan... Mar. 1, 2013 12:00 PM EST Reads: 11,973 |
By Kevin Nikkhoo  You've got SIEM, you employ log management. You even have access and or identity management. Each performs a specific security function for your enterprise, but unless they are working across all your information silos and collaborating their collective capabilities, you still might ha... Feb. 19, 2013 10:15 AM EST Reads: 8,873 |
By Kevin Nikkhoo  Risk is not unique to the cloud. The "how" (aka the technology) changes, but not the mission. True professionals know the argument is not about technology or how security is delivered, but rather one of governance and policy enforcement.
Do a Google search on “cloud security” and the ... Feb. 1, 2013 08:00 AM EST Reads: 10,384 |
By Kevin Nikkhoo  The lack of a proactive security strategy is much like an ostrich putting its head in the sand. It is a matter of when, not if attacks will happen. As enterprise systems are exposed to substantial risk from data loss, theft, or manipulation, a proactive unified approach deployed and ma... Jan. 18, 2013 09:45 AM EST Reads: 6,127 |
By Kevin Nikkhoo  Having all the security solutions--even if they're cloud-based--doesn't necessarily ensure holistic protection. In the modern enterprise, there are simply too many parallel silos of data. The key is to get the solutions not only to talk to each other, but to leverage one another's capa... Jan. 8, 2013 06:30 AM EST Reads: 11,787 |
By Kevin Nikkhoo  Using the Holiday season as a way to educate about the cloud.
Happy holidays to all of you and may the season keep your perimeters protected, your assets secure and your networks free of nasty little elves!
Twas the night before Christmas
and all through the net
No access was stirr... Dec. 27, 2012 07:45 AM EST Reads: 8,458 |
By Kevin Nikkhoo  Introducing a new security paradigm that leverages the cooperative functionality of various security tools. However, the key is still monitoring the results in real time; and the best case scenario (most efficient/effective means) for most companies to achieve this is via the cloud.
T... Dec. 20, 2012 09:00 AM EST Reads: 10,622 |
By Kevin Nikkhoo  Most attacks, like the recent DDoS attacks on banks, show most hackers do not use brute force to gain entry to sensitive data. And as organizations expand the perimeter of their networks,, there are so many more opportunities for data leakage and theft. To control it, a more nimble, fl... Dec. 10, 2012 08:00 AM EST Reads: 6,328 |
By Kevin Nikkhoo  Too often overlooked, SIEM (security information event management) needs to be a integral part of any enterprises security best practices. It facilitates a holistic view of an IT landscape and allows a company to be more proactive with its security initiatives.
First and foremost, SIE... Dec. 3, 2012 08:15 AM EST Reads: 15,010 |
By Kevin Nikkhoo  Did you know 72% of data breaches worldwide the previous year occurred at companies with 100 or fewer employees — a 63 percent increase. However, with unified security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
I just got off the phone wit... Nov. 23, 2012 10:00 AM EST Reads: 6,877 |
By Kevin Nikkhoo  PCI (Payment Card Industry) enforces Data Security Standards that looks to ensure that ALL companies that process, store or transmit credit card information maintain a secure environment. This can be a burdensome task unless retailer can leverage the cloud. This article takes a look at... Nov. 14, 2012 08:30 AM EST Reads: 7,273 |
By Kevin Nikkhoo  IT spends untold millions of dollars, thousands of man hours for technology designed to solve solutions, but because of complexity, budget shortfalls, lack of expertise or a myriad of other gremlins, too many initiatives never realize their potential. That was before cloud computing an... Oct. 27, 2012 02:00 PM EDT Reads: 6,537 |
By Kevin Nikkhoo  Too many IT departments take the stance of "I'll worry about it when I have to worry about it." Problem with security issues is, by then it's too late. Often times maintaining the status quo is as dangerous as doing nothing at all.
In my experience there are two types of enterprise IT... Oct. 19, 2012 10:00 AM EDT Reads: 8,626 |
By Kevin Nikkhoo  There is truly a difference in terms of scope, application and business need between security "in" the cloud and security "from" the cloud.
No, this isn't 7th grade English...I promise.
With all the important decisions IT departments make, what’s the big deal whether cloud security m... Oct. 7, 2012 01:00 PM EDT Reads: 7,617 |
By Kevin Nikkhoo  The issue of Big Data seems very prevalent these days. How to store it. How to manage it. And, how to best secure it. But Big Data is much more complex than a voluminous amount of information. It requires a new paradigm in application, process, and security...all from the cloud.
There... Oct. 1, 2012 08:00 AM EDT Reads: 11,066 |