Is your business preparing to move to the cloud? Or have you already adopted the cloud and are looking for ways to enhance cloud security and protect your company resources? As organizations trend towards cloud environments, new challenges and opportunities arise. A significant challenge is how to
We’re always looking for ways to get involved with local colleagues in the IAM space. In a recent session, we met with some of our peers at the Wisconsin IAM Meetup group in Waukesha, WI. I wanted to share some detail on these local Meetups, as there is benefit for technical, business and sales
This use case happens in many different industries, such as: Banking: account management Healthcare: medical record access There are other types of delegation possible, e.g. a parent-child delegation. For instance, as a parent, I want access to my underage children’s medical records. This
This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals concerned with keeping customer and proprietary data more secure attended the conference last week, which took place in Las Vegas, Nevada,
Some examples of policies are: Managers can view documents in their city Users can edit documents they own Each policy uses attributes. In the examples above, the policies use the following attributes: A user’s role e.g. manager An action e.g. view, edit. A resource type e.g.
As the web constantly evolves, so too do its foundations. Today, the web as we know it is built on web applications, web services, and APIs. This is a natural evolution from SOA (Service-Oriented Architecture) which was the foundation for a loosely coupled environment a decade ago. In SOA,