Blog Blog

    Zero Trust for IAM Managers

    Gal Helemski March 20, 2019

    Zero Trust for IAM Managers

    Gal Helemski March 20, 2019

    “Only the paranoid survive.” Andy Grove’s iconic title for his 1999 recommendations for coping with rapid changes in business environments is...

    Read More

    Popular posts

    The 3 Pillars of Authorization

    Gal Helemski October 04,

    The 3 Pillars of Authorization

    Gal Helemski October 04, 2018

    When dealing with today’s distributed IT environments, current Identity and Access Management (IAM) models are not flexible enough to support the...

    Read More

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22,

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22, 2017

    The growing complexity in managing access to sensitive data has prompted an ongoing evolution of access control policy and led to the definition of...

    Read More

    Policy Based Access Control: a Response to the Perfect Storm in Data-Sharing

    Oren Harel April 03,

    Policy Based Access Control: a Response to the Perfect Storm in Data-Sharing

    Oren Harel April 03, 2017

    Policy Based Access Control (PBAC) is a response to what observers such as Ethan Ayer, CEO of Resilient Network Systems, called “the perfect storm...

    Read More

    All posts

    Zero Trust for IAM Managers

    Gal Helemski March 20, 2019

    Zero Trust for IAM Managers

    Gal Helemski March 20, 2019

    “Only the paranoid survive.” Andy Grove’s iconic title for his 1999 recommendations for coping with rapid changes in business environments is...

    Read More

    Why PSD2 Demands an Upgraded Entitlement Management System

    Oren Harel March 14, 2019

    Why PSD2 Demands an Upgraded Entitlement Management System

    Oren Harel March 14, 2019

    Payment Services Directive 2 (PSD2) is an EU regulation designed to increase competition in the banking and payment industry, while also ensuring...

    Read More

    The Importance of Fine-Grained Authorization for Secure Content

    Gal Helemski March 04, 2019

    The Importance of Fine-Grained Authorization for Secure Content

    Gal Helemski March 04, 2019

    Identity and Access Management (IAM) solutions vary in their approach to Authorization, with the preferred method often being Role-Based Access...

    Read More