A review of authorization related features added to Microsoft Azure Platform between 2019-2022.
To access this post, you must purchase Member Content.
A review of authorization related features added to Google Cloud Platform between 2019-2022.
To access this post, you must purchase Member Content.
A review of authorization related features added to Amazon Web Services between 2019-2022
To access this post, you must purchase Member Content.
An analysis on VC funding in authorization, existing vendor feature additions and acquisition activity.
A primer on authorization technology, covering RBAC, ABAC, XACML, OAuth2, Open Policy Agent and Zanzibar.
To access this post, you must purchase Member Content.
A few items to appear in The Cyber Hut intelligence inboxes this week. Styra Launches Cloud Native Entitlements Solution Styra, the authorization startup behind Open Policy Agent, recently announced another solution to their kit bag. Their Cloud Native Entitlements approach seems to be aimed at bringing a distributed and replicated approach to entitlements management – […]
Our External Authorization Signals tracker focuses upon providers that deliver specialist authorization functions for web, data and APIs via centralised UI and policy design. Vendors Missing? Let Us Know Axiomatics Cloudentity PlainID Scaled Access (now part of OneWelcome) Veza Venture Capitalist Funding Source: Crunchbase EmployeeHeadcount Source: LinkedIn SocialReach Source: LinkedIn & Twitter CompanyAge Source: Crunchbase […]
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]
A few weeks ago I ran a slightly provocative and not very scientific poll on LinkedIn asking which was the more important: authentication or authorization? Clearly in the grand scheme of things that is a pretty pointless exercise, but the rationale was to really identify some thought processes and reactions. It provided some interesting responses. […]
A Request For Proposal template to assist buy side decision makers with the procurement of Authorization technologies and solutions. Table of contents includes: Vendor Background Project Description Functional Requirements Non-Functional Requirements Integration Deployment   The report is available for multiple users across the same enterprise. Please contact us for further details.     [contact-form to=”sales@thecyberhut.com” […]