Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Resilient Network Systems Unveils Automated IAM System

    By
    Chris Preimesberger
    -
    December 10, 2016
    Share
    Facebook
    Twitter
    Linkedin

      You can’t avoid all the chatter about identity access management here in late 2016, because there are so many inherent holes in older systems without efficient IAM that hackers are easily abusing, thus causing resultant daily mayhem.

      As 2017 approaches, cloud computing, mobility and the internet of things continue to erode traditional organizational boundaries. The ability to share data freely yet securely is becoming a key driver of competitive advantage. For many organizations, however, the requirement to share and collaborate is outweighed by those serious security vulnerabilities.

      So as its contribution toward helping solve these issues, San Francisco-based Resilient Network Systems, which makes an automated, policy-driven contextual access control package for enterprises and government agencies, came out Dec. 8 with the release of Resilient Access 3.0.

      [To see a larger view of the image at upper left, right-click on it and select “View Image.”]

      This is a solution designed for the connected organizations that extends access capabilities to automatically discover, organize and resolve the information or attributes needed to make smarter access decisions at scale.

      Not only do users have to use multiple layers of identity to gain access to a system protected by Resilient, the system also has in its database external information about the user from social networks and other public resources. Thus, there are many more levels of information used by Resilient to get to know the people who should be working inside the confines of the system.

      Resilient Access 3.0 connects organizations by going beyond identity to understand the complete context of any access request. Its home-built network-based architecture allows it to query distributed authoritative sources (LinkedIn, Twitter, Facebook, etc.) to understand and resolve the subject, resource, action and environmental attributes that make up a typical access request.

      Resilient Access 3.0 also includes traditional features like single-sign-on and multi-factor authentication, but also features a flexible policy workflow engine that enables organizations to quickly and easily safeguard files, apps, documents and data with their own custom access rules.

      “There have been some great developments lately in identity access management, but there are some elements that have yet to be accomplished,” Resilient Network Systems CEO Ethan Ayer told eWEEK. “An example would be what I would call a truly decentralized, internet-scale system that’ll help us handle the most challenging problems, such as giving access to individuals, handling IoT, bring your own device (BYOD), etc.

      “We’re evolving, and Resilient is trying to provide a missing piece in terms of decentralized access management, which doesn’t always rely on identity management occurring in the same place.”

      Resilient Access orchestrates all the necessary information so that organizations can be confident that they are granting appropriate access.

      “Our solution gives customers a convenient way to gather enough context to answer more sophisticated questions like ‘Is this a doctor?’ or ‘Is this a trusted device?'” Ayer said. “Enough data is already out there to separate good actors from the bad, thus eliminating most fraud and theft. It is our job as a community to connect and organize that data to manifest a more secure and private online future.”

      Resilient Access has been in development for several years by former Sun Microsystems executives Rob Gingell and Mark Hapner, among others, and is being used in both the public and private sectors.

      In addition to CEO Ayer, a former Partner at One Equity Partners & Milestone Venture Partners, the leadership team is comprised of Chairman Richard Spires, ex-CIO of the Department of Homeland Security; EVP of Development Gingell; and Hapner, an ex-Chief Engineer of Sun Microsystems and Sun Fellow and Consulting Engineer, who also was J2EE (Java 2 Enterprise Edition) Lead Architect and ex-Sun Distinguished Engineer.

      To learn more about Resilient Network Systems, go here.

      Avatar
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor-in-Chief of eWEEK and responsible for all the publication's coverage. In his 16 years and more than 5,000 articles at eWEEK, he has distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×