Download PDF version Contact company

As 2017 approaches, cloud computing, mobility and the Internet of Things continue to erode traditional organizational boundaries. The ability to share data freely is becoming a key driver of competitive advantage. For many organizations, however, the requirement to share and collaborate is outweighed by very real security concerns.

IAM Solutions

Identity Access Management (IAM), the traditional safeguard of internal sharing and collaboration, does not address the need for organizations to extend their reach by connecting with external parties. Equipped only with tools that let them manage provisioned identities, IT cannot safeguard external access requests. To confidently share information, organizations need more real-time information, authentication, and authorization options to make smart access decisions.

“Traditional IAM solutions use identity as the root of trust, but identity, as provisioned by a single entity, is insufficient for sharing sensitive resources with complex policies attached to them,” said Resilient Network Systems CEO Ethan Ayer. “Our solution gives customers a convenient way to gather enough context to answer more sophisticated questions like “Is this a doctor?” or “Is this a trusted device?” Enough data is already out there to separate good actors from the bad, thus eliminating most fraud and theft. It is our job as a community to connect and organize that data to manifest a more secure and private online future.”

Custom Access Rules

Resilient Network Systems’ contextual access solution, Resilient Access, orchestrates all the necessary information so that organizations can be confident that they are granting appropriate access. Unique network-based architecture allows the system to query distributed authoritative sources to understand and resolve the subject, resource, action and environmental attributes that make up a typical access request. In addition to traditional features like single-sign-on and multi-factor authentication, a flexible policy workflow engine enables organizations to quickly and easily safeguard apps, data, documents, and files with their own custom access rules.

Spearheading Team

The result of years of advanced research and development, Resilient Access is being used in both the public and private sectors. In addition to CEO Ethan Ayer, a former Partner at One Equity Partners & Milestone Venture Partners, the leadership team is comprised of Chairman Richard Spires, ex-CIO of the Department of Homeland Security, EVP Development Rob Gingell, ex-Chief Engineer of Sun Microsystems and Sun Fellow and Consulting Engineer Mark Hapner, J2EE Lead Architect and ex-Sun Distinguished Engineer.

Save

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...