• Product

    Product

    Get a demo

    • Product overview
    • Integrations
    • Developer documentation
    • Help center
  • Use cases

    Use cases

    Get a demo

    Featured whitepaper
    Featured customer story
    • Eliminate standing access

      Remove standing access to critical systems with dynamic access management

    • Adopt AI securely

      Enforce real-time authorization for AI and MCP-powered agents

    • Protect cloud infrastructure

      Ensure critical cloud environments like AWS and Azure can only be accessed when necessary

    • Protect developer platforms

      Ensure critical actions in code repositories like GitHub can only be performed under the right conditions

    • Manage user sessions with contextual access

      Manage and revoke privileged sessions using CAEP-enabled context

  • Resources

    Resources

    Featured whitepaper
    Featured customer story
    • Blog
    • Events
    • Customer stories
    • Expert hours
    • Continuous Identity Sessions
    • caep.dev
    • Glossary
    • SGNL technical training
  • Customer stories
  • Company

    SGNL

    Get a demo

    • About us
    • Events
    • Careers
    • Media kit
    • Contact us
    • Become a partner
    • Customer support
Get a demo

Blog

Categories
  • All
  • AI & MCP security
  • Cloud and application security
  • Continuous Identity
  • Expert viewpoints
  • Identity security guides
  • Industry trends
  • Session management & CAEP
  • SGNL updates
  • Zero Standing Privilege

The four MCP use cases: Summary of a discussion at IIW

Oct 29, 2025
AI & MCP security

Agentic AI use cases are evolving rapidly. At IIW, we mapped four MCP use cases that show how identity and authorization must adapt. This post shares the highlights and emerging challenges from that discussion.

Cloud security policies that work

Oct 28, 2025
Identity security guides, Cloud and application security

Cloud access control isn’t just about roles and permissions. It’s also about context. SGNL enforces real-time, risk-aware policies across cloud providers, adapting instantly when business or security conditions change.

From static to smart: building Continuous Identity

Oct 21, 2025
Continuous Identity, Expert viewpoints

Featured guest post.

The guide to making Continuous Identity real in GitHub

Oct 20, 2025
Continuous Identity, Identity security guides, Cloud and application security

Discover how to protect your source code with Continuous Identity by connecting GitHub to your existing stack—Okta, Jira, and device management—so developers get just-in-time access tied to actual work, not standing permissions.

JIT access is still standing access to your cloud

Sep 30, 2025
Continuous Identity, Zero Standing Privilege, Expert viewpoints

Just-in-time access promises to solve standing privilege problems, but time-boxed credentials with broad entitlements still leave exposure windows that attackers can exploit.

Securing your enterprise with Continuous Identity and Jamf device trust

Sep 30, 2025
Continuous Identity, SGNL updates

SGNL’s integration with Jamf brings real-time device trust into every access decision, ensuring that only secure, compliant endpoints can reach your most critical systems.

The guide to making Continuous Identity real in AWS

Sep 29, 2025
Continuous Identity, Identity security guides, Cloud and application security

The breakdown on how to eliminate standing AWS privileges by connecting your existing tools—Okta, ServiceNow, PagerDuty, and CrowdStrike—into a Continuous Identity architecture that grants just-in-time access based on real-time context.

Unblocking enterprise MCP adoption with profiles

Sep 24, 2025
Identity security guides, AI & MCP security, Expert viewpoints

MCP has great potential. Let’s enable enterprises to enforce policy

Questions that matter: How to spot security vaporware before it wastes your time

Sep 23, 2025
Industry trends, Expert viewpoints

Cut through the buzzwords and get to the truth with smarter questions that reveal whether a security product actually works

Stale access, stale risk: is Continuous Identity the answer?

Sep 12, 2025
Continuous Identity, Expert viewpoints

Featured guest post. Traditional IAM was built for a static world that no longer exists—discover why point-in-time identity decisions can't keep pace with today's dynamic business environment and evolving cyber threats.

  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»