Cybersecurity Resources
How to Leverage Flowcharts for effective Requirements Document?
In the world of identity and access management (IAM), flowcharts often seem…
Rethinking Identity Governance: The Power of Native Change Detection in SailPoint ISC
SailPoint Native Change Detection (‘NCD’) offers a smarter way to monitor and…
Managing Non-Employee Access: Risks, Challenges & How SailPoint Helps
Managing non-employee access has unique challenges. SailPoint NERM solution provides tailored solutions…
Supporting SailPoint IGA Customers Beyond Go-Live: Enhancing ROI Through Ongoing Support & Maintenance
Implementing SailPoint IGA solution is a major step in strengthening enterprise identity…
The Rise of Broken Access Controls
Recent surveys have found that 94% of applications tested have some form…
Is your Web App using Weak Cipher Suites?
Weak cipher suites can leave systems vulnerable to attacks, potentially exposing sensitive…
Multinational Real Estate Organization
Our client is a Singaporean multinational real estate operating organization. The organization…
A Fintech Company headquartered in Singapore
Our client is a fintech company headquartered in Singapore. The company was…
Leading Logistics company with Global presence
Our client is a leading logistics company with worldwide presence. Hexadius was…
Regional Semiconductor Company
Our client is headquartered in Singapore, with production facilities located in ASEAN…
Large Utility Company in Singapore
The Company was using multiple independent SAP instances and wanted to implement…
Property Company in Singapore
Our client multi-national businesses across asset classes such as residential, hospitality, retail,…












