Identity, Access and Security

Strengthening the Security Experience in a Software Driven Business

Overview

With the proliferation of technology and usage of data in modern business models, accurate user identification has become critical. As business models and consumer habits evolve, most businesses across industries are dependent on and are enabled by technology platforms.

As businesses grow beyond current boundaries, regulations and privacy concerns are forcing them to be responsible with their customers’ data. Identity and security are integral as companies utilize the reach and elasticity of cloud platforms. Systems that enable a business to expand its knowledge of customer identity in an agile, secure, and privacy-aware method thus become the driver of business growth.

Our security expertise helps our customers deliver and protect value when composing technology for their digital transformation.

Identity, Access and Security
Offerings

Knowledge of user identity has become the fundamental building block in a modern enterprise. The security expertise at Persistent is an important dimension of how we help our customers be responsible as they track and understand their customers’ habits, preferences, and usage patterns by collecting and analyzing data.

Identity & Access Modernization

Strategy, assessments and transformation of identity governance and access platforms to support next-gen business and operational requirements for an enterprise and consumer identities (CIAM) using frictionless risk-based adaptive authentication techniques

Data Access Governance & Privacy

Help organizations with discovery, classification, tagging of data assets and setup a governance model to manage risk and meet regulations in an increasingly privacy aware business environment

Cloud Security

Strategy, assessments and roadmaps for moving identity infrastructure to leverage cloud offerings to improve security posture and operational efficiency and reduce overall risk

Partners

Nok Nok Labs

Oracle

Customers

Rajiv Dholakia and Ramesh Kesanupalli of Nok Nok Labs on how they are reinventing security for the digital ecosystem

News & Views

Dattaraj Jagdish Rao on zero-trust model provides an effective approach to improve security and be better prepared to mitigate risks

Dattaraj Jagdish Rao talks about the importance of Explainable AI that aims at improving the transparency of ML models

Transforming cybersecurity with AI and ML. Abhay Pendse, AVP, Head Data Practice at Persistent Systems tells us more…

Whitepaper – Technology Predictions for 2019 – The Six Digital Currents Steering Enterprises into the New Age

Best practices for IoT security

Forbes: ATM ‘Jackpotting’ attacks reveal deeper problem

Don’t get caught in an IoT security nightmare

whitepaper-icon

The Equifax Data Breach: A case study on how NOT to handle a breach

WannaLaugh? Bolster your security program in under a dozen steps

Miss the “C” Word and be doomed

Et-CISO

Wannacry Attack Advisory: How to prevent the ransomware from spreading

iot-agenda-partners-logo

Once bitten, twice shy: How to ward off the ransomware blues

zinnov-iot-technology-services-logo

Blink, touch or speak and say goodbye to passwords as Nok Nok Labs teams up with Persistent to simplify sign-in for App Services

GDPR: The power to control your own personal data

iot-agenda-partners-logo

Biometric bank buffers, for all

Persistent Systems granted development rights by USAA

Persistent Systems granted development rights by USAA

USAA gives development rights to Persistent Systems

USAA gives development rights to Persistent Systems

Made in the USAA: Bank to license its own tech

Made in the USAA: Bank to license its own tech

constellation-research

A new global player emerges in continuous authentication

constellation-research

Taking security to the bank – moving money without getting ambushed

Identity, Access and Security
featured-asset-nok-nok-labs-logo

Nok Nok Labs on how they are reinventing security for the digital ecosystem

You May Be Interested In

Views

Transforming cybersecurity with AI and ML. Abhay Pendse, AVP, Head Data Practice at Persistent Systems tells us more…

Offerings

Endpoint Detection and Response Solution

Views

The Equifax Data Breach: A case study on how NOT to handle a breach

Start typing and press Enter to search

Contact Us
close slider

Contact Us
Have a question? Drop us a line and we will get in touch with you!

Yes, I would like Persistent to contact me on the information provided above. Click Here to read our full Privacy Notice.