Author: Bhaskar RV

Bhaskar is Product Lead at Akku, where he plays a key role in shaping the roadmap and development of our identity and access management platform. He collaborates closely with cross-functional teams to ensure that solutions are robust, scalable, and aligned with evolving customer needs. His focus is on driving innovation and continuous improvement to deliver maximum value to clients. Before Akku, Bhaskar worked as a System Administrator at Megha IT Consulting and Smilax Laboratories, where he managed IT infrastructure and enterprise systems, gaining strong hands-on experience in networks, servers, and application environments.

How to Secure BYOD Devices in a Hybrid Workplace Using Akku Mobile Device Manager

Are your employees’ personal devices putting your organization’s data at risk? With hybrid work becoming the norm, people are accessing…

3 months ago

What Is Passwordless Authentication, and How Does It Work?

Passwords are a mess. People forget them, reuse them, and store them in risky ways. Even strong ones can get…

5 months ago

Differences Between Authentication and Authorization in Enterprise Security Systems

Authentication and Authorization, often referred to by their shorthand names - authn and authz - serve distinctly different purposes. Understanding…

5 months ago

A Customized Device-Based Access Control Solution for an Automotive Ancillary Major using Akku

Data security is a critical business priority today - this is especially true for businesses in industries such as manufacturing,…

2 years ago

Blockchain Technology: A new chapter in Identity & Access Management

Why do you need an IAM? These tools help businesses manage their corporate identities and each employee’s access to different…

2 years ago

Passwordless Authentication: Why you need it, how it works, and how Akku takes it further

How do you strengthen your identity verification processes? Most organizations go the route of stronger password policies and tight password…

2 years ago

The simpler way to manage Remote Employee Onboarding

When onboarding new employees, it’s important to keep the process as simple as possible. When all new user activity occurs…

3 years ago

When should you implement an IAM solution?

In which stage of the user or employee lifecycle should an IAM solution ideally be implemented? The answer is: Right…

4 years ago

Transitioning from a legacy IAM to an interwoven Identity Fabric

With the emergence of cloud apps, identities need to be managed outside the traditional network. This has introduced new security…

4 years ago

IAM as the Solution to Healthcare Sector Challenges

Healthcare organizations are unique in the volume and sensitivity of information that they hold. Reports say that healthcare is among…

5 years ago