Remove Architecture Remove Authentication Remove Policies
article thumbnail

The Architecture of Identity Systems

Phil Windley

Summary: The architecture of an identity system has a profound impact on the nature of the relationships it supports. This blog post uses terminology and ideas from Sam's paper to classify and analyze three different identity system architectures. In particular his terminology was helpful to me. Wikipedia defines legitimacy as.

article thumbnail

Protecting BigData Inside and Out: Learn from Cloudera engineers in DC 7 May

CTOvision

Yet, big data is itself a member of this environment and requires controls for authentication, authorization, audit, and protection. Organizations realizing the information advantage of an enterprise data hub (EDH) need tools that extend their security and governance controls to this mission-critical architecture.

Big Data 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Authentic Digital Relationships

Phil Windley

In his article Architecture Eats Culture Eats Strategy , Tim Bouma makes the point that the old management chestnut Culture Eats Strategy leaves open the question: how do we change the culture. Tim's point is that architecture (in the general sense) is the upstream predator to culture. This is their fundamental architecture.

article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Zero Trust architecture was created to solve the limitations of legacy security architectures. It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. Access is authorized based on business policies informed by identity and context.

Firewall 158
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Not bad, but suppose policy requires 12 or more characters; we have to pad the password: 0M4xyZ!9ptL#K. Instituting secure computing behavior can be ingrained, but it has to be built into both policies and culture. Their two-factor authentication solution consists of a unique device ID and the big data pattern associated with it.

Security 249
article thumbnail

Nile unwraps NaaS security features for enterprise customers

Network World

It’s a zero-trust architecture featuring end-to-end encryption and automatic updates to ensure security patches are up to date. All traffic is forwarded to a centralized policy enforcement point for precise inspection and routing, Katukam said. With its latest upgrades, the startup has added Nile Trust Service to its offering.

Security 174
article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3-D printing is known by many names; depending upon the context, the term may also be referred to as rapid prototyping, stereolighography, architectural modeling or additive manufacturing. The products are connected to the Internet and the data they generate is easily available. 3D Printing Design & Implementation. Predictive Analytics.