Contextual Access Management

Access management is still somehow built on old ideas—When once upon a time, users could be seen only as roles, and roles could be assigned appropriate access. And while it wasn’t easy, exactly to enforce access controls, it was at least relatively straightforward.

But now, business has changed. The office is the office and the home office, the coffee shop, the client site. And the endpoint is the desktop, the laptop, sometimes even someone else’s laptop, the tablet, the phone.

Work is being done outside the hard firewall, out in the wild wider world, and now the driving factor for access management is minimizing risk.

How do we do that? By building an access system that will judge every request in the appropriate context.

Contextual Access Management is a system that makes decisions about granting or denying access based on numerous factors like location (where in the world are they? the office? hong kong?), device (is this a phone using public wifi? a desktop protected by your firewall), access request (are they logging into email or trying to view accounting data?), time (regular business hours? nowhere near regular business hours?) and user role (is this the CEO or joe the suspicious intern?).

A contextual access solution will assign levels of risk to each of these factors and make a decision based on the overall risk. The system should be able to dynamically make decisions based on each request.

But more than just allowing or blocking access, the system will also be able to grant variable levels of access based on the contextual risk of the request. Sounds great, but how does it work?

Most available applications do not allow granular control, so access decisions need to be made by outside tools. But believe it or not, this isn’t as complicated as it might seem.

There are a variety of tools out there right now that can be used to build a contextual access system. It’s not new technology. It’s a new way of using our technology to bring access management forward.

No more nebulous access issues. Lower risk without handicapping work. We can show you.

Want to learn more?

Project Details

Date: October 24, 2014
Tags: company, infrastructure