Our Process

This is a full service IM Solution. What the managed services provides is either support and improvement of your current system in place or a system created from scratch based on your company’s specific needs.

Weeks to complete

Our most recent post:

Weblogic monitoring with Zabbix using JMX

Weblogic monitoring with Zabbix using JMX In this Tutorial, I will monitor Oracle Identity Manager’s health state. Here we have 1 Admin server, 2 oim server, and 2 soa servers. Step 1: Login to WebLogic console. 1st step is log in to the WebLogic console with Weblogic account. You will get the following console after login. Every server has its “State” = Running. In this Tutorial, we will only monitor the “state” of the server, so if it’s not on“Running” state then Zabbix will trigger an alert...

read more

Identity and Access Management 101

Identity and access management, IAM, is within enterprise IT and is about defining and managing all roles and access privileges of individual...

Sath made the 2016 Inc. 5000 list!!

The 2016 Inc. 5000 list is full of superheroes of the U.S. economy. America's fastest-growing private companies wield powers like strategy, service,...

Sath’s Virtualization Lab-part 2

Most every company will face a time where they need to increase their company's infrastructure and capacity but do not have the room or money to...

Sath’s Virtualization Lab-part 1

Most every company will face a time where they need to increase their company's infrastructure and capacity but do not have the room or money to...

Cybersecurity in 2015- part 4

Here is part 4 of our review on the cybersecurity issues the US government faced in 2015. Other initiatives being taken             Riding the...

Cybersecurity in 2015- part 3

Here is part 3 of our review on the cybersecurity issues the US government faced in 2015. Cybersecurity Legislation Created             On April...

Cybersecurity in 2015-part 2

Here is part 2 of our review of the cybersecurity issues the US government faced in 2015. What came from these incidents             Despite their...

Cybersecurity in 2015-part 1

In a short 4 part series we take a look at all the cybersecurity issues that the US government faced in 2015. Cybersecurity 2015             The...