Ship AI without shipping risk.

Blog

Insights on identity security, access governance, and modern IGA.

  • Baton and the Journey to Identity Security and Unified Access Control

    Baton and the Journey to Identity Security and Unified Access Control

    ·Alex Bovee
    To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
  • Technical Deep Dive: Using Baton to Audit Infrastructure Access

    Technical Deep Dive: Using Baton to Audit Infrastructure Access

    ·John Degner
    Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
  • Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    ·Paul Querna
    Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
  • Achieve Least Privilege Access with C1 + Okta

    Achieve Least Privilege Access with C1 + Okta

    ·Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with C1
  • How to Be SOC2 Compliant: A Checklist for Security Teams

    How to Be SOC2 Compliant: A Checklist for Security Teams

    ·Shanelle Rucker
    Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.
  • Birthright Access is Broken

    Birthright Access is Broken

    ·Alex Bovee
    Birthright access is an anti-pattern for secure, least privilege access control.
  • Running Your UAR Campaigns: Product Deep Dive

    Running Your UAR Campaigns: Product Deep Dive

    ·Marissa Endres
    Following our last post on scoping UARs with C1, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.
  • Architecting Zero Trust: Twingate + C1

    Architecting Zero Trust: Twingate + C1

    ·Marissa Endres
    Twingate and C1 partnered to provide customers with a Zero Trust solution that gives you just-in-time, time-based remote access to your private resources and networks.
  • Scoping Your UAR Campaigns: Product Deep Dive

    Scoping Your UAR Campaigns: Product Deep Dive

    ·Marissa Endres
    We're breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with C1.