Menu
Kshitij Ratnaparkhi
  • Security
  • Cloud
  • DevOps
Kshitij Ratnaparkhi

What is Cyber security

Cyber security is the practise of defending against malicious attacks or unauthorized access to computers, mobile devices, electronic systems, networks, and data. Cyber security can also be referred to as security for information technology. Importance of Cyber security Cyber security is critical since vast quantities of data on computers and other devices are collected, processed,…

Securing your Salesforce application with IBM Security Verify

Software applications play an important role in our lives. Whether it is in the home or workplace, we use them for communicating with people, staying up-to-date with the things happening in the world, keeping entertained, doing work and much more. Salesforce is a cloud computing service as a software (SaaS) company that specializes in customer…

Work Securely with Your Partners and Contractors

In today’s modern era, it is very common for enterprises to work with contractors and business partners. This brings a variety of users from outside the network. These users are known broadly as the extended enterprise. Though the extended enterprise can be critical in enabling organizations to scale their business, it also brings massive risks…

What is Cloud Access Security Broker (CASB)

A Cloud Access Security Broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure. CASBs work by ensuring that network traffic between on-premises devices…

AuthN & AuthZ

AuthN and AuthZ are very commonly used terms but are confusing to a novice computer user. So trying to explain with example. AuthN – Authentication is establishing the your identity. AuthZ – Authorization is establishing your privilege Authentication is the process of verifying who you are and making sure you are who you say you…

Administrator Credentials: High Impact Security Breach

When you think about enterprise data security, the first thing you picture is an outside intruder. It might be some kid in a dark basement hacking into your servers, or maybe a more sophisticated attack from a cyberspy contingent overseas. However, one of the greatest threats to your enterprise data security stance might be sitting…

Are You Using Jenkins the Right Way?

Jenkins is a popular open source tool to perform continuous integration and build automation. The basic functionality of Jenkins is to execute a predefined list of steps, e.g. to compile Java source code and build a JAR from the resulting classes. The trigger for this execution can be time or event based. For example, every 20…

What is DevOps

There are many definitions of the word “DevOps.” Is it a movement? A new process or technology? A job title? Or just a way of thinking? DevOps is a combination of software development and operations—and as its name suggests, it’s a melding of these two disciplines in order to emphasize communication, collaboration, and cohesion between…

How to configure SSO with Salesforce using IBM Cloud Identity Connect

This guide describes detailed steps for configuring SAML 2.0 federated single sign-on using predefined connector between IBM Cloud Identity and Salesforce. For this federation configuration, IBM Cloud Identity acts as Identity Provider (IDP). Salesforce acts as Service Provider (SP). Following are the high level steps for configuring SSO between IBM Cloud Identity and Salesforce: Configure…

Getting started with IBM Cloud Identity Connect

IBM allows you to create a a 30 days trial account for IBM Cloud Identity Connect. If you are already leveraging one of the other IBM Cloud products then you can enjoy IBM Cloud Identity Connect for one year. How to create a new account for IBM Cloud Identity Connect – Go to IBM Marketplace…

IBM Cloud Identity

In an effort to help speed cloud adoption across the enterprise, IBM released a new identity management solution on June 15, 2017 that simplifies employee access to business applications across a hybrid cloud environment. IBM Cloud Identity Connect is designed for managing how employees gain access to their preferred business applications. It is a new…

IDaaS Vendors to Watch

Gartner analysts predict that by 2020, 40 percent of IAM purchases will use IDaaS delivery model, a two-fold increase from less than 20 percent today. Perhaps more important is that 40 percent of those IDaaS implications will entirely replace on-premises IAM implementations, according to Gartner. Future, is in the cloud. Here are the top IDaaS…

What is Identity as a Service (IDaaS)

What is IDaas? Identity as a Service (IDaaS) is cloud-based authentication operated by a third-party provider. The X-as-a-service model means some feature (X) is being delivered or served through a remote connection from a third-party provider, as opposed to a feature being managed on site and by in-house personnel alone. Very simple and day to…

What is Hybrid Cloud?

As the name indicates, it is the functional combination of both public and private clouds. A public cloud like Microsoft Azure leverages the shared chunks of networking infrastructure, computing and its storage which are rented on a specific time basis for the customers. A private cloud comes with the same components but will be restricted…

Can Blockchain prevent data breaches?

Last year broke all records for data breaches according to IBM X-Force Threat Intelligence Index . With over four billion records stolen last year,businesses have an increasing financial incentive to protect their data. A number of industry guidelines and government compliance regulations mandate strict governance of sensitive or personal data to avoid data breaches. Within…

How Blockchain works

One of the most compact definition of BlockChain – “A BlockChain is just another type of database for recording transactions — one that is copied to all the computers in a participating network.” The blocks are arranged in fixed structures that include a header and the content. The header block contains all the metadata like a…

What is blockchain

Blockchain is one of the most important invention science the internet itself.  It is a distributed database that maintains a continuously growing list of ordered records called blocks. Each block contains a timestamp and a link to a previous block. Blockchains are secure by design and an example of a distributed computing system with high…

  • Home
  • About Me
  • Contact Me
©2021 Kshitij Ratnaparkhi | Powered by SuperbThemes & WordPress