Insights on identity security, access governance, and modern IGA.
Baton and the Journey to Identity Security and Unified Access Control
·Alex Bovee
To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
Technical Deep Dive: Using Baton to Audit Infrastructure Access
·John Degner
Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access
·Paul Querna
Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
Achieve Least Privilege Access with C1 + Okta
·Samira Kahangi
Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with C1
How to Be SOC2 Compliant: A Checklist for Security Teams
·Shanelle Rucker
Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.
Birthright Access is Broken
·Alex Bovee
Birthright access is an anti-pattern for secure, least privilege access control.
Running Your UAR Campaigns: Product Deep Dive
·Marissa Endres
Following our last post on scoping UARs with C1, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.
Architecting Zero Trust: Twingate + C1
·Marissa Endres
Twingate and C1 partnered to provide customers with a Zero Trust solution that gives you just-in-time, time-based remote access to your private resources and networks.
Scoping Your UAR Campaigns: Product Deep Dive
·Marissa Endres
We're breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with C1.