Blog Blog

    The Importance of Fine-Grained Authorization for Secure Content

    Gal Helemski March 04, 2019

    Identity and Access Management (IAM) solutions vary in their approach to Authorization, with the preferred method often being Role-Based Access...

    Read More

    Popular posts

    The 3 Pillars of Authorization

    Gal Helemski October 04,

    The 3 Pillars of Authorization

    Gal Helemski October 04, 2018

    When dealing with today’s distributed IT environments, current Identity and Access Management (IAM) models are not flexible enough to support the...

    Read More

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22,

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22, 2017

    The growing complexity in managing access to sensitive data has prompted an ongoing evolution of access control policy and led to the definition of...

    Read More

    Policy Based Access Control: a Response to the Perfect Storm in Data-Sharing

    Oren Harel April 03,

    Policy Based Access Control: a Response to the Perfect Storm in Data-Sharing

    Oren Harel April 03, 2017

    Policy Based Access Control (PBAC) is a response to what observers such as Ethan Ayer, CEO of Resilient Network Systems, called “the perfect storm...

    Read More

    All posts

    The Importance of Fine-Grained Authorization for Secure Content

    Gal Helemski March 04, 2019

    The Importance of Fine-Grained Authorization for Secure Content

    Gal Helemski March 04, 2019

    Identity and Access Management (IAM) solutions vary in their approach to Authorization, with the preferred method often being Role-Based Access...

    Read More

    Fine-Grained Authorization and Other Key IAM Terms

    Gal Helemski February 20, 2019

    Fine-Grained Authorization and Other Key IAM Terms

    Gal Helemski February 20, 2019

    The world of Identity and Access Management (IAM) has a language of its own which is continually evolving as new technologies emerge and security...

    Read More

    Mark Your Calendars Now for Identity & Access Management Events in 2019

    Gal Helemski February 13, 2019

    Mark Your Calendars Now for Identity & Access Management Events in 2019

    Gal Helemski February 13, 2019

    IAM professionals and cyber security experts have another exciting year of events to look forward to in 2019. Whether you’re looking to network with...

    Read More