Search
Close this search box.

Tag: Product & Technology

IAM Concept of the Week: RBAC versus ABAC

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week let’s discuss Role-Based Access Control (RBAC) and Attribute-based Access Control (ABAC) – both are popular approaches to determine who can access an organization’s

IAM Concept of the Week: Authentication versus Authorization

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week’s post is short but involves two critical and related terms: authentication and authorization. These terms are frequently confused mainly

GovTech – Adventures and Observations in IAM: Contextual Access Control Demo at DHS

Demonstrating ‘Contextual Access Control’ at the 2017 DHS S&T Urban Operational Experimentation Event by Daemon Price It’s an interesting time to be in Government Technology. Join me here every few weeks where I’ll share my observations on the latest technology happenings within the Beltway and across Government. We’ll discuss the

IAM Concept of the Week: FIDO (Fast Identity Online)

IAM Concept of the Week blog series – Each week we define and explain the significance of a concept in the world of Identity and Access Management. This week our IAM Concept of the Week deals with FIDO (Fast Identity Online), an authentication technology largely based on biometrics. FIDO is supported by

Concept of the Week: SAML, OAuth2 and OpenID Connect

Introducing our new IAM Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management.This week let’s talk about 3 protocols – SAML, OAuth and OpenID Connect – that are often mentioned when discussing authentication

Why context is everything

We’ve had a great response from customers and the media (see eWeek, NetworkWorld, SiliconAngle) to last week’s release of Resilient Access 3.0. At the core of this new release is functionality that we are calling contextual access control. We believe that to securely share data and connect organizations we need to go beyond today’s narrow definition

Resilient Partners with FinalCode DRM to Protect Data Everywhere

The digital right management sector is an excellent fit for Resilient’s adaptive access management capabilities, and we are very excited to announce our partnership with FinalCode. The combined power of our two technologies will help enterprises and government agencies securely share files and collaborate across boundaries, by ensuring that the right users

Resilient Adds Google Authenticator to Its Network

We are happy to announce that we’ve added Google Authenticator to our menu of pre-integrated authentication methods. You can now include this widely used method when creating adaptive access policies to protect your documents and apps. Google Authenticator is based on a Time-based One-Time Password (TOTP) that is generated by the Google

Trust, security and privacy in IoT

I attended two workshops in February, IEEE End-to-End Trust and Security Workshop for the Internet of Things; and IEEE Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy. I gave a brief presentation at the IoT workshop on how what we’re doing at Resilient relates to the emerging IoT space.