Article May 4, 2015 Demystifying Hadoop Security This article discusses the requirements of effectively implementing secure Hadoop for enterprise data management. Di Freeze, Editor Love0
Article January 20, 2015 Connecting Office 365 to an Identity and Access Management Solution Follow these steps to create a clean cloud with proper access rights for employees. Di Freeze, Editor Love0
Article January 6, 2015 3 Key Steps for Implementing Identity Access Management (IAM) in the Cloud Here’s how to cost-effectively incorporate apps you’ve moved to the cloud into your security and… Di Freeze, Editor Love0