Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Cloud-Centric Permission Management: A Conversation with Ron Nissim

In this conversation, Phillip Wylie is joined by Ron Nissim, the CEO of Entitle. They delve into the dynamic world of authentication and privilege access management, exploring the significance of automation and simplification in securing our digital landscape. They dive into the future of authorization and how innovative solutions like Entitle are reshaping the way we protect our data and systems.

3 Types of Privileged Accounts to Secure in a Transforming Enterprise

For security teams managing their enterprises’ privileged access management (PAM) programs, times have changed and what’s considered a privileged or high-risk account has drastically shifted. In turn, the way organizations not only manage privilege, but comprehensively secure it, must also shift. Historically, organizations have managed their PAM programs by vaulting and rotating credentials on privileged accounts.

How to revoke access for unwanted guests in Azure Active Directory

Do your house guests still have access to your home after they’ve left, or overstayed their welcome? No, right? You would throw them out or take the keys back because they no longer require access. Guests in Azure are like house guests. Once they no longer need access, it's then time to take back the key so they no longer have access to the company's data and connected apps. Yet many organizations are inadvertently leaving themselves at risk of supply chain attacks.

How Vanta uses Okta for identity and access management

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the team’s approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

Just in Time Privilege Elevation in Active Directory

In my days of AD administration, there was always a need for a select set of sysadmins to be granted high levels of permissions. In AD, this is typically a separate user admin account that is a member of the Domain Admins Active Directory group. There are a few other groups that are highly privileged(i.e. Enterprise Admins and Schema Admins) but the permissions required by these groups are generally more specific and therefore less populated.

Unlock the power of identity governance with cloud-based IGA

In today's interconnected and rapidly evolving digital landscape, managing and securing identities within an organization has become paramount. The traditional approach to identity governance and administration (IGA) often falls short, leading to inefficiencies, security vulnerabilities and compliance challenges. However, with the advent of cloud-based IGA solutions, businesses can now unlock a new level of power, scalability and flexibility.