Blog Blog

    The Challenges and Solutions of Using XACML-Based Authorization

    Gal Helemski September 04, 2017

    The Challenges and Solutions of Using XACML-Based Authorization

    Gal Helemski September 04, 2017

    When used correctly, XACML is a powerful tool to manage access and authorization, however, it has its challenges. Fortunately, solutions have been...

    Read More

    Role Explosion: The Unintended Consequence of RBAC

    Oren Harel August 21, 2017

    Role Explosion: The Unintended Consequence of RBAC

    Oren Harel August 21, 2017

    Until quite recently, access control in large enterprises has been predominantly managed with “Role-based Access Control”, or RBAC,  a policy neutral...

    Read More

    Must-Have Skills for Identity & Access Management Professionals

    Oren Harel August 07, 2017

    Must-Have Skills for Identity & Access Management Professionals

    Oren Harel August 07, 2017

    Identity and Access Management (IAM) has seen both technological changes and market growth. The market for IAM solutions is building fast with a CAGR...

    Read More