Resilient Network Systems - Experts & Thought Leaders
Latest Resilient Network Systems news & announcements
Resilient Access allows safeguarding apps, data, documents, and files with their own custom access rules As 2017 approaches, cloud computing, mobility and the Internet of Things continue to erode traditional organisational boundaries. The ability to share data freely is becoming a key driver of competitive advantage. For many organisations, however, the requirement to share and collaborate is outweighed by very real security concerns. IAM solutions Identity Access Management (IAM), the traditional safeguard of internal sharing and collaboration, does not address the need for organisations to extend their reach by connecting with external parties. Equipped only with tools that let them manage provisioned identities, IT cannot safeguard external access requests. To confidently share information, organisations need more real-time information, authentication, and authorisation options to make smart access decisions. “Traditional IAM solutions use identity as the root of trust, but identity, as provisioned by a single entity, is insufficient for sharing sensitive resources with complex policies attached to them,” said Resilient Network Systems CEO Ethan Ayer. “Our solution gives customers a convenient way to gather enough context to answer more sophisticated questions like “Is this a doctor?” or “Is this a trusted device?” Enough data is already out there to separate good actors from the bad, thus eliminating most fraud and theft. It is our job as a community to connect and organise that data to manifest a more secure and private online future.” Custom access rules Resilient Network Systems’ contextual access solution, Resilient Access, orchestrates all the necessary information so that organisations can be confident that they are granting appropriate access. Unique network-based architecture allows the system to query distributed authoritative sources to understand and resolve the subject, resource, action and environmental attributes that make up a typical access request. In addition to traditional features like single-sign-on and multi-factor authentication, a flexible policy workflow engine enables organisations to quickly and easily safeguard apps, data, documents, and files with their own custom access rules. Spearheading team The result of years of advanced research and development, Resilient Access is being used in both the public and private sectors. In addition to CEO Ethan Ayer, a former Partner at One Equity Partners & Milestone Venture Partners, the leadership team is comprised of Chairman Richard Spires, ex-CIO of the Department of Homeland Security, EVP Development Rob Gingell, ex-Chief Engineer of Sun Microsystems and Sun Fellow and Consulting Engineer Mark Hapner, J2EE Lead Architect and ex-Sun Distinguished Engineer. Save
Resilient Access 3.0 features enhanced integrations, more authoritative sources and lays the groundwork for device-specific credentials Resilient Network Systems, a policy-driven contextual access control solution for enterprises and government agencies, announced the release of Resilient Access 3.0, a ground-breaking contextual access solution designed for the connected organisation. Resilient Access 3.0 extends access capabilities to automatically discover, organise and resolve the information or attributes needed to make smarter access decisions at scale. “In order to compete successfully, organisations need to become more open by sharing and collaborating with the outside world,” said Ethan Ayer, CEO of Resilient Network Systems. “Unfortunately, many hesitate to share due to weak credentials or limited access to reliable counterparty information. Resilient Access finally solves this issue, enabling even the most data-sensitive organisations to connect securely across boundaries, at Internet scale.” Data security solution Resilient Access 3.0 connects organisations by going beyond identity to understand the complete context of any access request. Its unique network-based architecture allows it to query distributed authoritative sources to understand and resolve the subject, resource, action, and environmental attributes that make up a typical access request. Resilient Access 3.0 also includes traditional features like single-sign-on and multi-factor authentication, but also features a flexible policy workflow engine that enables organisations to quickly and easily safeguard files, apps, documents, and data with their own custom access rules. Resilient Access 3.0 The latest version of the platform features enhanced integrations, more authoritative sources and lays the groundwork for device-specific credentials. • A dozen new integrations including, Box, Google Directory, Google Authenticator, Acceptto, Intensity Analytics, Axiomatics and more;• A partnership and integration with DRM vendor, FinalCode, to provide end-to-end file security;• Audit log view allows organisations to easily track user authentication metrics, reporting and analytics functionality;• Enhanced security, scalability and availability through the use of Docker containers, CoreOS clusters and AWS multi-availability zone infrastructure;• Graphical view of access policy workflow to simplify administration;• Support for attribute retrieval from identity providers, databases and web services;• OpenID Connect support added to existing protocols (SAML, LDAP and AD);• Responsive UX for mobile clients;• Enhanced support for attributes to enable ABAC and RBAC policies including integration with XACML policy decision points. Resilient Access is a renamed, upgraded version of the Resilient Network Systems’ Trust Network, a Trust Network-as-a-Service (TNaaS). Save
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download