Today HTS turns 10 years old!

Today HTS turns 10 years old!

It has been 10 years since October 18, 2012, the first day of HTS’s activities. 10 years of cybersecurity and regulatory compliance products and services for both private and public organizations. Our mission remains the same: to ensure a balance between the need for security and people’s privacy. What has…

  • HTS
>
What is log management?

What is log management?

Log management is the management of log records of a computer system. Specifically, it involves the need to manage the chronological recording of activities within an IT infrastructure consisting of various sources such as files, servers, machines, nodes, devices, etc. for inspection, security, and privacy protection purposes. In the field…

  • log
  • log management
>
User provisioning, what it is and its advantages

User provisioning, what it is and its advantages

User provisioning is an IT process that defines the configuration of an IT infrastructure. It can refer to servers, networks, devices, applications, services, and users. In this article, we will focus on the latter. Foto di Gerd Altmann da Pixabay…

  • IAM
  • identity access management
>
What is an IAM (Identity and Access Management) software?

What is an IAM (Identity and Access Management) software?

An IAM (Identity and Access Management) software is a tool that defines who the users that can access a network are and what they can do, see and use The principle is that of the airport security officer: the IAM software is its digital version, and…

  • IAM
  • identity access management
>
Calculating the ROI for an IAM project

Calculating the ROI for an IAM project

Calculating the ROI for an Identity and Access Management (IAM) implementation project is of fundamental importance for companies. In many cases, such projects do not get off the ground because the economic return of an IAM system cannot be accurately estimated. What costs should be considered and how should they…

  • cost saving
  • IAM
  • identity access management
>
Data security, three cases of inefficiency in user and access management

Data security, three cases of inefficiency in user and access management

Data breaches are an increasingly critical problem for companies and public organizations. The number of attacks is constantly growing and hackers are increasingly focusing on stealing user credentials to access the system, block it, and blackmail companies. In 82% of cases (source Verizon data breach 2022), attacks are carried…

  • IAM
  • identity access management
  • Safety
>
3 Reasons to Implement an IAM System

3 Reasons to Implement an IAM System

What are the reasons to implement an IAM system? IAM (Identity and Access Management) software helps IT managers, system administrators, data protection officers (for GDPR) and internal auditors manage network accounts and permissions every day. What are three reasons why businesses, public entities and organizations should use this tool? An…

  • IAM
  • identity access management
>
Corporate security between weak passwords and excessive authorization: the first line of defence is..?

Corporate security between weak passwords and excessive authorization: the first line of defence is..?

Did you know that, according to a recent study on corporate security (“Cloud Threat Report: IAM the first line of defence” by Unit 42 – research and threat intelligence division of Palo Alto Network): – 44% of organizations allow password reuse? – 53% of cloud accounts allow use of weak…

  • identity access management
  • Safety
>
Identity and access management: a comparison between public and private sectors

Identity and access management: a comparison between public and private sectors

What does Identity and Access Management (IAM) mean?It refers to the structured process and computer solutions that allow the centralized and automated management of access and authorization for employees and collaborators who need to access various corporate resources (email, folders, applications, tools, databases, etc.) from different devices (desktop, tablet, smartphone,…

  • identity access management
>
Public and Private Healthcare: How to Avoid Mistakes and Save 70% of IT Time.

Public and Private Healthcare: How to Avoid Mistakes and Save 70% of IT Time.

Did you know that 70% of requests that reach the IT department of public and private healthcare are related to password reset and change? It’s an estimated percentage, of course, but realistic if we think that as the number of users increases, so does the complexity of managing them and…

  • healthcare
  • identity access management
>