An independent vendor assessment of Axiomatics, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Styra, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Access control has very much been centred around models. Who should have access to what, when (and maybe more importantly why) has fascinated computer security researchers since the 1970’s. There have been several models for describing access over the years – many unfortunately lost to the academic past – being taught but never used. However, […]
A selection of curated links relating to user login and authentication security controls and threat counter measures.

A review of authorization related features added to Microsoft Azure Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Amazon Web Services between 2019-2022

This post is only available to members.
An analysis on VC funding in authorization, existing vendor feature additions and acquisition activity.

A primer on authorization technology, covering RBAC, ABAC, XACML, OAuth2, Open Policy Agent and Zanzibar.

This post is only available to members.
Do we need a "Chief Identity Officer"? What might drive the need for this and can existing business operating models satisfy the need for identity centric metrics?
Identity and Access Management has long been confined to two (or maybe three) buckets: B2E (employee focused), B2C (external consumer or customer focused) and then the “other” bucket – namely for IoT, machine to machine and application or process style IAM. I understand these buckets. My clients understand these buckets. Vendors talk to stakeholders in […]