identity management

Data Protection Thrives on a Comprehensive Approach to Security

Data protection requires effectively coordinating good practices across many security domains. It is actually a large subset of the overall security program. Take a look:


If you’re familiar with Security Architects Partners, you’ll know we’re both broad and deep in… Continue reading

An Enterprise Authorization Framework Requires Identity and Context

We recently completed a consulting engagement to create an authorization framework for a large financial services organization. As illustrated, the framework has three dimensions: Runtime authorization patterns, policy models, and governance structures.


The “runtime authorization patterns” describe the components, interfaces,… Continue reading

Subscribe to Blog Notifications...  HERE