Blog
Product
Use cases
JIT access to AWS infrastructure
SOC 2 audit preparation
Secure access to PHI
Boost signal-to-noise ratio
Customer data access
Integrations
AWS Identity Center
Okta
PagerDuty
Explore all integrations
Pricing
Docs
Blog
Company
About
Careers
Security
Search
Search Blog
Talk To Us
Login
Risk
Understanding the Rise of Phishing
By
Mathew Pregasen
•
September 20, 2023
Recent Posts
Devops
The best way to improve security is to speed up
By
Nick Moore
•
August 18, 2023
Access Management
How to create adaptive access policies by integrating historical user behavior
By
Jon Bass
•
August 15, 2023
Access Management
The evolution of access management: From anarchy to bureacracy
By
Nick Moore
•
August 10, 2023
Identity
After Identity
By
Adam Buggia
•
July 21, 2023
SOC-2
Set up SOC 2-compliant AWS Access Management in 30 Minutes
By
Bailey P
•
June 27, 2023
Slack
Slack is an Underrated AWS Access Management Solution
By
Bailey P
•
June 23, 2023
Case Study
Understanding IaC’s Diverging Foundations Through Terraform and Ansible
By
Mathew Pregasen
•
June 2, 2023
Platform Engineering
How LEGO Taught Me About Buying Platform Software
By
Max Baehr
•
June 2, 2023
Case Study
Sym and Bryter: Mitigating the Risks of Permanent Access
By
Sandy Kwon
•
May 11, 2023
Case Study
Sym and Jellyfish: Reducing AWS Access for SOC 2 Compliance
By
Sandy Kwon
•
May 2, 2023
Case Study
Sym and Courier: Enabling Secure Access to Customer Data
By
Sandy Kwon
•
April 25, 2023
AWS
What Every Developer Should Know About AWS Vault
By
Phillip Ninan
•
April 20, 2023
Chatops
Remember ChatOps? A Fading Term, but Flourishing Practice
By
Mathew Pregasen
•
April 13, 2023
More Posts