Download PDF version Contact company

Resilient Network Systems, a policy-driven contextual access control solution for enterprises and government agencies, announced the release of Resilient Access 3.0, a ground-breaking contextual access solution designed for the connected organisation. Resilient Access 3.0 extends access capabilities to automatically discover, organise and resolve the information or attributes needed to make smarter access decisions at scale.

“In order to compete successfully, organisations need to become more open by sharing and collaborating with the outside world,” said Ethan Ayer, CEO of Resilient Network Systems. “Unfortunately, many hesitate to share due to weak credentials or limited access to reliable counterparty information. Resilient Access finally solves this issue, enabling even the most data-sensitive organisations to connect securely across boundaries, at Internet scale.”

Data security solution

Resilient Access 3.0 connects organisations by going beyond identity to understand the complete context of any access request. Its unique network-based architecture allows it to query distributed authoritative sources to understand and resolve the subject, resource, action, and environmental attributes that make up a typical access request. Resilient Access 3.0 also includes traditional features like single-sign-on and multi-factor authentication, but also features a flexible policy workflow engine that enables organisations to quickly and easily safeguard files, apps, documents, and data with their own custom access rules.

Resilient Access 3.0

The latest version of the platform features enhanced integrations, more authoritative sources and lays the groundwork for device-specific credentials.

• A dozen new integrations including, Box, Google Directory, Google Authenticator, Acceptto, Intensity Analytics, Axiomatics and more;
• A partnership and integration with DRM vendor, FinalCode, to provide end-to-end file security;
• Audit log view allows organisations to easily track user authentication metrics, reporting and analytics functionality;
• Enhanced security, scalability and availability through the use of Docker containers, CoreOS clusters and AWS multi-availability zone infrastructure;
• Graphical view of access policy workflow to simplify administration;
• Support for attribute retrieval from identity providers, databases and web services;
• OpenID Connect support added to existing protocols (SAML, LDAP and AD);
• Responsive UX for mobile clients;
• Enhanced support for attributes to enable ABAC and RBAC policies including integration with XACML policy decision points.

Resilient Access is a renamed, upgraded version of the Resilient Network Systems’ Trust Network, a Trust Network-as-a-Service (TNaaS).

Save

Download PDF version Download PDF version

In case you missed it

Indonesia immigration boosts security with HID U.ARE.U™ Camera
Indonesia immigration boosts security with HID U.ARE.U™ Camera

Reliable identity verification is an unwavering requirement at mission-critical checkpoints such as border crossings. Oftentimes, however, this involves slow manual processes that...

How are wearable technologies impacting the security market?
How are wearable technologies impacting the security market?

The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and...

The future of home security: how AI integration is rapidly changing security systems for the better
The future of home security: how AI integration is rapidly changing security systems for the better

As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in...

Quick poll
What's the primary benefit of integrating access control with video surveillance?