Policy-Based Access Control – Consistent Across the Enterprise

  • LANGUAGE: English DATE: Wednesday, October 14, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Policy-Based Access Control – Consistent Across the Enterprise

The evolution of cybersecurity protection demands a more nuanced response to providing access to a company’s sensitive resources. Policy-based access control (PBAC) combines identity attributes and context variables to enable sophisticated granting of access to corporate systems and protected resources based on centrally managed policies that ensure consistent access control decisions across the enterprise. Advancement in both business requirements and technology (such as growing use of micro-services), require a better way to control access. In a way that is consistent across all silos, dynamic enough to react to change in risk, and provides better control for the application business owners.

PBAC facilitates the application of consistent policy across all applications that use the PBAC authorization service. Furthermore, policies are evaluated in real-time against current attributes rather than having to wait for a nightly update of identity attributes before access control policy is correctly applied. PBAC also facilitates a risk management approach to access decisions. If access outside business hours represents a greater risk the authorization service could prompt for an additional authentication factor before access is granted.

Join this webinar and learn more about

  • Drivers for the deployment of dynamic authorization technology
  • The desire for common policy deployment across an enterprise
  • The need to accommodate diverse access control requirements within an organization
  • The requirement for real-time access control decisions

KuppingerCole Senior Analyst Graham Williamson will explain the key findings and insights of the recent Market Compass report on dynamic authorization management.

He will be joined by Gal Helemski, Co-founder and Chief Innovation & Product at PlainID, who will discuss the deployment of PBAC and address how the granting of access entitlements can be managed in real-time using a consistent, business-driven approach.


   

Market Compass: Dynamic Authorization Management
by Graham Williamson

The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Management market and provides a comparison of the main product offerings. Dynamic Authorization externalizes access control decisions to a centrally-managed authorization service that evaluates access policies in real-time to permit or deny a user’s access request to resources.


Speakers

Gal is a recognized specialist in cyber security with specific focus on identity and access management. In the past 16 years she has defined solutions to customers, wrote the project specs, technical documentation, presentations and training. Gal holds a B.Sc in Physics & Computer Science...


Lead Sponsor

PlainID provides a simple and intuitive way for fast-paced organizations to create and manage their authorization policies.
Our agile, standards-based platform acts as a master policy layer, managing multiple policies seamlessly between all facets of IAM. PlainID simplifies Authorization to one point of decision, one point of control and one point of view of every authorization level: in the cloud, mobile and on-premise applications.
We provides both enablement policies – define what an identity can access or can request, and restrictive policies – define what shouldn’t happen – SOD (separation of duties), Compliance and security policies. Policies are managed in graphical display, clearly visualizing the connections between people, devices and services and all those authorizations. 

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00