Ship AI without shipping risk.

Blog

Insights on identity security, access governance, and modern IGA.

  • The SSO Tax: What It Is and Why It Sucks

    The SSO Tax: What It Is and Why It Sucks

    ·Ishaan Banta
    In recent years, software vendors have used the importance of SSO to their advantage, building SSO-implementation fees into their pricing—a practice that’s come to be known as the “SSO Tax," a cause of major frustration for companies of all sizes and budgets.
  • Announcing Support for Webhooks

    Announcing Support for Webhooks

    ·Brittany Smail
    We're excited to announce support for webhooks! C1 customers can now use webhooks to trigger access control workflows across their environment.
  • Your Problems Aren't Unique: How to Build a Foundation Against Overprivileged Access in Any Environment

    Your Problems Aren't Unique: How to Build a Foundation Against Overprivileged Access in Any Environment

    ·Ishaan Banta
    Does overprivileged access keep you up at night? Learn foundational steps for reducing privileges and increasing security that work for every environment, no matter how complex or unique your challenges may seem.
  • Introducing Baton Feeds

    Introducing Baton Feeds

    Learn all about Baton feeds, Baton's newly released low-latency streaming capability. In this dev blog, we cover how feeds works, how to add it to a Baton connector, and the new functionality it enables.
  • Securing America’s Ports: The Biden-Harris Initiative on Maritime Cybersecurity

    Securing America’s Ports: The Biden-Harris Initiative on Maritime Cybersecurity

    ·Ishaan Banta
    The Biden-Harris administration recently announced an initiative to strengthen maritime cybersecurity. In this post, we’ll explore the key elements of the initiative and their implications for the maritime industry and industries like it.
  • Introducing shadow app detection, tracking, and management in C1

    Introducing shadow app detection, tracking, and management in C1

    ·Brittany Smail
    We're excited to announce C1’s new shadow app functionality, which enables customers to identify and monitor logins to unauthorized apps and bring those apps under full management in the platform.
  • Introducing C1's Identity Graph: Unified Identity, Access, and Authorization Across Your Complex Environment

    Introducing C1's Identity Graph: Unified Identity, Access, and Authorization Across Your Complex Environment

    ·Marissa Endres
    We believe companies need comprehensive visibility into access across their systems to protect identity in today's complicated environments. C1's Identity Graph provides that unified visibility and underpins the platform's new security dashboard and powerful new search and visualization capabilities.
  • NYDFS Regulation: What It Means for Access Controls and How to Comply

    NYDFS Regulation: What It Means for Access Controls and How to Comply

    ·Brittany Smail
    The NYDFS recently updated its cybersecurity regulations, requiring companies to implement stricter access controls than ever before to protect sensitive data. Learn more about the new rules and how to comply.
  • Zero Trust in Practice: How We Keep Customer Data Secure at C1

    Zero Trust in Practice: How We Keep Customer Data Secure at C1

    ·Brittany Smail
    Our company mission to “secure the workforce” guides not only how we design our platform but also our multilayered internal approach to protecting customer data.