Blog

The NEW classification 101 – The Why & The How

In this post I will reiterate what we have been presenting to partners, analysts and customers alike – from a ‘why we did this’ perspective to a ‘how we did this’ approach. As covered in the previous post, we built this product primarily out of frustration being a user of

Read More »

IAM Concept of the Week: RBAC versus ABAC

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week let’s discuss Role-Based Access Control (RBAC) and Attribute-based Access Control (ABAC) – both are popular approaches to determine who can access an organization’s

Read More »

Engaging the Stakeholders of ECM

Engaging the Stakeholders of ECM Engaging the Stakeholders of ECM In today’s Digital Age, data and information are an organization’s lifeblood: What are the 3Q revenues from our best-selling product? How many workers under age 30 do we employ? How many software licenses in our IT enterprise are set to

Read More »

IAM Concept of the Week: Authentication versus Authorization

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week’s post is short but involves two critical and related terms: authentication and authorization. These terms are frequently confused mainly

Read More »