• Product

    Product

    Get a demo

    • Product overview
    • Integrations
    • Developer documentation
    • Help center
  • Use cases

    Use cases

    Get a demo

    Featured whitepaper
    Featured customer story
    • Eliminate standing access

      Remove standing access to critical systems with dynamic access management

    • Adopt AI securely

      Enforce real-time authorization for AI and MCP-powered agents

    • Protect cloud infrastructure

      Ensure critical cloud environments like AWS and Azure can only be accessed when necessary

    • Protect developer platforms

      Ensure critical actions in code repositories like GitHub can only be performed under the right conditions

    • Manage user sessions with contextual access

      Manage and revoke privileged sessions using CAEP-enabled context

  • Blog
  • Company

    SGNL

    Get a demo

    • About us
    • Events
    • Careers
    • Media kit
    • Contact us
    • Become a partner
    • Customer support
Get a demo

Blog

Categories
  • All
  • AI & MCP security
  • Cloud and application security
  • Expert viewpoints
  • Identity security guides
  • Industry trends
  • Session management & CAEP
  • SGNL updates
  • Zero Standing Privilege

Subscribe to SGNL's blog

Follow us

The Case for Justified Access

Apr 6, 2022

RBAC and ABAC cannot contain privilege sprawl, and in fact contribute to it. Dynamic authorization based on signals and data from across an enterprise can bring us closer to a "least privilege" access model.

Why I Left Google to Start SGNL

Mar 18, 2022

In October of 2021 I drove to Google’s Irvine office to turn in my employee badge and laptop. It was four years after Google acquired my last company and a new adventure beckoned. It would seem unnatural for anyone to walk away from such a great job working …

What Ails Enterprise Authorization

Feb 15, 2022

While the “Identity” part of Identity and Access Management is looking better than it used to, the “Access Management” part is still very much a wild-west landscape. Identity has benefited from robust multi-factor authentication, anomaly detection and password …

  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»

Meet with SGNL