Blog Blog

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22, 2017

    NGAC vs. XACML: What’s Really the Difference?

    Oren Harel May 22, 2017

    The growing complexity in managing access to sensitive data has prompted an ongoing evolution of access control policy and led to the definition of...

    Read More

    It’s Time To Modernize Your Legacy IAM

    Gal Helemski May 15, 2017

    It’s Time To Modernize Your Legacy IAM

    Gal Helemski May 15, 2017

    Think you can’t afford to modernize your legacy IAM? If you feel it’s just too expensive to invest in enhancing your IAM, consider this: It may...

    Read More

    Attending The K(NO)W Identity Conference? Don’t Miss These Sessions

    Oren Harel May 08, 2017

    Attending The K(NO)W Identity Conference? Don’t Miss These Sessions

    Oren Harel May 08, 2017

    The K(NO)W Identity Conference is a unique event that enables security professionals to connect with every aspect of the identity industry across all...

    Read More