• Careers | Call Us: +1 315 215 3290


    Category Archives: Information Security

  • best-practices-application-security
  • chainlink-690503_1920


    There are two stories in the news that you get to hear almost every day.

    The first is the phenomenal growth happening in the Entrepreneurial world with startups becoming the darling of the investment world and leading to amazing innovation in various fields. The second are the Security breaches that are surely shaking the foundation of business.


    The first one is a delight while the second one is a plight that leads to FUD (Fear, Uncertainty and Doubt) syndrome. Read more

  • identity-access-management-success

    Let me start by listing few scenarios:


    • I bought one of the best products in the IAM space by looking at a prominent research agency document but find that the product does not meet my business objectives.

    • The IAM solution does not support straight integration with many of the applications in my environment though the Sales guy promised me Out-of-box integration.

    • The IAM product is not able to implement many of my business processes related to On-boarding and termination of Users.

    • Any integration with newer applications leads to Vendor stating that it needs a custom connector to integrate those applications with the deployed IAM solution.

    • I was promised that the entire digital lifecycle management will be automated when the IAM product is deployed and I still have multiple manual process existing and makes the entire process more troublesome than before.

    • My Top Management looks at our IAM program as a money pit and a failure. This product sucks. God, can you please send me to the old days when internet was not there!

    Read more

  • application-security-india
  • clients-security-challenges
    Why we exist in the world

    Sacumen was born to address the pressing need of Enterprises and Product companies looking for a trusted, focused and niche Security services partner to help them develop innovative security products and solutions so that they can stay ahead of the curve in view of the ever evolving security challenges and stay relevant in a competitive market and ever changing business dynamics and threat landscape.
    Read more