Blog Blog

    The 3 Types of Attributes IAM Professionals Need to Understand

    Oren Harel January 03, 2019

    Many organizations rely solely on Role Based Access Control (RBAC) to make access decisions. The problem is that RBAC can only manage access control...

    Read More

    Popular posts

    The 3 Pillars of Authorization

    Gal Helemski October 04,

    The 3 Pillars of Authorization

    Gal Helemski October 04, 2018

    When dealing with today’s distributed IT environments, current Identity and Access Management (IAM) models are not flexible enough to support the...

    Read More

    The Limitations of Traditional Authorization Solutions

    Oren Harel December 26,

    The Limitations of Traditional Authorization Solutions

    Oren Harel December 26, 2018

    Consider an international flight. The passengers bought tickets and the crew work on the plane –  but they don’t all have the same rights. Passengers...

    Read More

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22,

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22, 2017

    The growing complexity in managing access to sensitive data has prompted an ongoing evolution of access control policy and led to the definition of...

    Read More

    All posts

    The 3 Types of Attributes IAM Professionals Need to Understand

    Oren Harel January 03, 2019

    The 3 Types of Attributes IAM Professionals Need to Understand

    Oren Harel January 03, 2019

    Many organizations rely solely on Role Based Access Control (RBAC) to make access decisions. The problem is that RBAC can only manage access control...

    Read More

    The Limitations of Traditional Authorization Solutions

    Oren Harel December 26, 2018

    The Limitations of Traditional Authorization Solutions

    Oren Harel December 26, 2018

    Consider an international flight. The passengers bought tickets and the crew work on the plane –  but they don’t all have the same rights. Passengers...

    Read More

    The Evolution of Authorization

    Gal Helemski December 17, 2018

    The Evolution of Authorization

    Gal Helemski December 17, 2018

    Corporate approaches to identity and access management (IAM) have evolved as technology has advanced. The advances provide enforcement of...

    Read More