Blog

What happens to IAM when it’s all in the cloud?

April 3rd, 2017|Categories: Cloud, Identity Access Management|

In our experience, Identity and Access Management (IAM) is often an afterthought when organisations migrate to the cloud. 99.9% of our customers will have already [...]

Jackson Shaw of One Identity talks Digital Transformation with Peter Boyle

March 31st, 2017|Categories: Digital Transformation|

Burning Tree were at the Gartner IAM Show on 6 March, meeting with information security professionals and keeping abreast of innovation in the sector. Peter [...]

Creating digital identity strategies to enable digital transformation

March 6th, 2017|Categories: Digital Transformation|

Over the last few years there has been growing acceptance of the need for digital transformation. Yet, the term digital transformation covers many different ideas [...]

RSA Conference USA 2017: 3 Reasons To Attend

January 18th, 2017|Categories: Conference|

Next month is the annual RSA Conference in San Francisco. Like many UK and European based organisations, we attend the RSA Conference event (#RSAC) every [...]

How to Automate Governance, Risk and Compliance (GRC) to Reduce Costs

December 13th, 2016|Categories: Data Protection|

IT Governance, Risk Management discipline, Information Security Policy and legal compliance requirements all place a burden on companies to ensure their governance, risk and compliance [...]

Core Principles Of Building A Secure Network Architecture

November 22nd, 2016|Categories: Data Protection|

In many organisations IT projects are designed to address business objectives or as operational solutions without any thought about security. The security ‘solution’ is often [...]

Load More Posts
burningtree.co.uk