Download PDF version Contact company

As 2017 approaches, cloud computing, mobility and the Internet of Things continue to erode traditional organisational boundaries. The ability to share data freely is becoming a key driver of competitive advantage. For many organisations, however, the requirement to share and collaborate is outweighed by very real security concerns.

IAM solutions

Identity Access Management (IAM), the traditional safeguard of internal sharing and collaboration, does not address the need for organisations to extend their reach by connecting with external parties. Equipped only with tools that let them manage provisioned identities, IT cannot safeguard external access requests. To confidently share information, organisations need more real-time information, authentication, and authorisation options to make smart access decisions.

“Traditional IAM solutions use identity as the root of trust, but identity, as provisioned by a single entity, is insufficient for sharing sensitive resources with complex policies attached to them,” said Resilient Network Systems CEO Ethan Ayer. “Our solution gives customers a convenient way to gather enough context to answer more sophisticated questions like “Is this a doctor?” or “Is this a trusted device?” Enough data is already out there to separate good actors from the bad, thus eliminating most fraud and theft. It is our job as a community to connect and organise that data to manifest a more secure and private online future.”

Custom access rules

Resilient Network Systems’ contextual access solution, Resilient Access, orchestrates all the necessary information so that organisations can be confident that they are granting appropriate access. Unique network-based architecture allows the system to query distributed authoritative sources to understand and resolve the subject, resource, action and environmental attributes that make up a typical access request. In addition to traditional features like single-sign-on and multi-factor authentication, a flexible policy workflow engine enables organisations to quickly and easily safeguard apps, data, documents, and files with their own custom access rules.

Spearheading team

The result of years of advanced research and development, Resilient Access is being used in both the public and private sectors. In addition to CEO Ethan Ayer, a former Partner at One Equity Partners & Milestone Venture Partners, the leadership team is comprised of Chairman Richard Spires, ex-CIO of the Department of Homeland Security, EVP Development Rob Gingell, ex-Chief Engineer of Sun Microsystems and Sun Fellow and Consulting Engineer Mark Hapner, J2EE Lead Architect and ex-Sun Distinguished Engineer.

Save

Download PDF version Download PDF version

In case you missed it

Alamo enhances security with Alcatel-Lucent solutions
Alamo enhances security with Alcatel-Lucent solutions

Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expan...

When choosing an access solution, make total cost of ownership a key part of the calculation
When choosing an access solution, make total cost of ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many...

The Camp: Enhance security with ASSA ABLOY Aperio wireless locks
The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is div...

Quick poll
What's the primary benefit of integrating access control with video surveillance?