+
  • Category: What's New

How to Write Authorization Policies for Big Data

Tech
When it comes to securing access to services and data, we see many different use cases and, with that, the enforcement of authorization rules at...

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

Access Control 101
This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals...