<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / identity</title>
<link>http://netvouz.com/lillymark/tag/identity?feed=rss&amp;pg=4</link>
<description>lillymark&#39;s bookmarks tagged &quot;identity&quot; on Netvouz</description>
<item><title>How to hack through Phone Ring Test</title>
<link>http://blog.aujasnetworks.com/hack-phone-ring-test.html</link>
<description>As new technologies are coming up day by day, we tend to ignore the older ones. Taking advantage of this, attackers always try to make you a victim by getting access to the older technologies. Modem is one of these old age technologies, so beware!</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 17 Jan 2013 10:50:00 GMT</pubDate>
</item><item><title>How to integrate components of vulnerability risk into larger business risk using GRC tool</title>
<link>http://blog.aujasnetworks.com/integrate-components-vulnerability-risk-larger-business-risk-grc-tool.html</link>
<description>Vulnerability Assessment is more or less a standard activity across organization and across the globe for all large, small and medium enterprises. It is hygiene, compliance requirements or simple risk based approach to identify vulnerabilities both internet facing and internal systems and applications and patch them.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 06 Sep 2012 12:02:03 GMT</pubDate>
</item><item><title>How to Pen-Test Java Applet</title>
<link>http://blog.aujasnetworks.com/pentest-java-applet.html</link>
<description>This article discusses in detail the lesser known art of Pen-Testing Java Applets/Thick Client apps. Here I have explained in detail the process of Pen-Testing Java applets starting from how to go about intercepting data between an Applet and the remote server.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 17 Jan 2013 10:15:17 GMT</pubDate>
</item><item><title>Identity &amp; Access Management – Integral Part of an Enterprise’s Security</title>
<link>http://www.scribd.com/doc/138634931/Identity-Access-Management-%E2%80%93-Integral-Part-of-an-Enterprise%E2%80%99s-Security</link>
<description>It is often said that a chain is only as strong as its weakest link. And when it comes to IT security in many enterprises, the weakest link is usually identity and access management. With the rise of information fraud increasing, it is time for enterprises to renew their focus on identity and access management (IAM).</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 30 Apr 2013 05:25:46 GMT</pubDate>
</item><item><title>Identity Access Management Empowering Global Business</title>
<link>http://www.greendoc.net/view/568337/identity_access_management_empowering_global_business</link>
<description>Today global expansion has become the norm to stay in the aggressively competitive world, requiring enterprises to manage large consumer base and businesses to expand their transactions network.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 05 Jun 2013 07:44:17 GMT</pubDate>
</item><item><title>Identity access management solutions</title>
<link>http://www.scribd.com/doc/151856004/Information-Risk-Management-Approach-to-Ensure-Data-Protection</link>
<description>In today’s hacker friendly world, ensuring information security is the greatest concern of governments, military, corporations, financial institutions, hospitals and businesses.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 10 Jul 2013 05:52:19 GMT</pubDate>
</item><item><title>Identity Access Management to Manage Risks and Comply with Regulations</title>
<link>http://www.docstoc.com/docs/159048233/Identity-Access-Management-to-Manage-Risks-and-Comply-with-Regulations</link>
<description>Today with enterprises being technologically advanced, they are having a hard time trying to manage a large user base and application base. They are constantly challenged when managing critical activities that include provisioning new users, de-provisioning users and identifying which users have access to which resource.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 05 Jun 2013 11:08:30 GMT</pubDate>
</item><item><title>Identity Access Management-Providing Access to Right Data</title>
<link>http://www.slideshare.net/AujasNetworks/identity-access-management-providing-access-to-right-data</link>
<description>The business environment in large as well as small and medium enterprises today is so technology dependent  that most of the communications across its offices and distantly placed teams are through the digital corporate networks.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 07 May 2013 08:01:21 GMT</pubDate>
</item><item><title>Identity and Access Management Solution for Metlife</title>
<link>http://www.aujas.com/images/info-2.jpg</link>
<description>Aujas offers end-to-end services for Identity and Access Management -Strategy and Design, Control Integration and Sustenance and Optimization.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 24 Jul 2013 06:29:18 GMT</pubDate>
</item><item><title>Identity and Access Management Solutions</title>
<link>http://www.aujas.com/identity-access-management.aspx</link>
<description>Aujas provides value across all phases of an Identity and Access Management (IAM) initiative includingAccess Governance, Role Based Access Control, Single Sign-on and User-Life cycle management</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 24 Dec 2012 09:48:10 GMT</pubDate>
</item></channel></rss>