AWS and the Quest for Identity-Centric Security

September 13, 2016 |
Control user access to AWS resources, in a very fine-grained way, without having to manually create and maintain burdensome lists of IP addresses across security groups

Everyone using Amazon Web Services (AWS) quickly becomes familiar with the Shared Responsibility model for security, depicted below. This is a necessary, and well-thought-out part of the AWS design, clearly delineating what customers and AWS are responsible for from a... Read More

How to Simplify, Secure and Scale AWS User Access

September 8, 2016 |
How to Simplify, Secure and Scale AWS User Access

Managing and automating tightly controlled user-access in AWS is just too complex and too slow for several reasons: 1. User access is IP centric but their IP addresses change (office, home, mobile) 2. Dynamic environments cause extra administrative burden 3.... Read More

Managing the Risks of Third-Party Access

August 30, 2016 |
Risky Business: The Largest Cyber-Risk for Financial Advisors

Recently some of the most catastrophic data breaches in history made US companies answerable to millions of customers whose data was compromised, as well as costing those companies millions in remediation and lost revenues. In the most notable cases, the... Read More