• Product

    Product

    Get a demo

    • Product overview
    • Integrations
    • Developer documentation
    • Help center
  • Use cases

    Use cases

    Get a demo

    Featured whitepaper
    Featured customer story
    • Eliminate standing access

      Remove standing access to critical systems with dynamic access management

    • Adopt AI securely

      Enforce real-time authorization for AI and MCP-powered agents

    • Protect cloud infrastructure

      Ensure critical cloud environments like AWS and Azure can only be accessed when necessary

    • Protect developer platforms

      Ensure critical actions in code repositories like GitHub can only be performed under the right conditions

    • Manage user sessions with contextual access

      Manage and revoke privileged sessions using CAEP-enabled context

  • Resources

    Resources

    Featured whitepaper
    Featured customer story
    • Blog
    • Events
    • Customer stories
    • Expert hours
    • Continuous Identity Sessions
    • caep.dev
    • Glossary
    • SGNL technical training
  • Customer stories
  • Company

    SGNL

    Get a demo

    • About us
    • Events
    • Careers
    • Media kit
    • Contact us
    • Become a partner
    • Customer support
Get a demo

Blog

Categories
  • All
  • AI & MCP security
  • Cloud and application security
  • Continuous Identity
  • Expert viewpoints
  • Identity security guides
  • Industry trends
  • Session management & CAEP
  • SGNL updates
  • Zero Standing Privilege

Mark Your Calendars: Closing the 2024 IAM Conference Season in Style

Sep 18, 2024
Industry trends, Expert viewpoints

A packed Fall 2024 lineup will help you get on top of the latest advances

From Broad Defense to Surgical Precision: Integrating CAEP with XDR

Sep 9, 2024
SGNL updates, Session management & CAEP

XDR offers a forceful response. CAEP complements it by adding precision

Secure Identity and Context in Microservices with Tratteria

Sep 3, 2024
SGNL updates, Session management & CAEP

Open-source implementation of the new Transaction Tokens standard

De-Value Authentication; De-Value the Attack Vector

Aug 28, 2024
Identity security guides, Zero Standing Privilege

SOC teams should worry about identity compromise. Not your CEO.

ZSP vs Manual Privileges:

Aug 20, 2024
Identity security guides, Zero Standing Privilege

Different Strategies, Vastly Different Outcomes

Zero-Standing Privilege: The Next Evolution in Financial Services Security

Aug 14, 2024
Zero Standing Privilege

Regulations and critical market position necessitate a transformation in access security

CAEP Use Case: Increase Token Lifetime

Aug 6, 2024
Session management & CAEP, Zero Standing Privilege

Dynamic session revocation enables longer session tokens

Highlights from IETF 120

Aug 2, 2024
Industry trends, Expert viewpoints

Advancements in Identity Security

Hackers Don’t Break In

Aug 1, 2024
Zero Standing Privilege, Expert viewpoints

They Log In

How People.ai Has Future-Proofed Data Security with Zero Standing Privilege

Jul 25, 2024
SGNL updates, Identity security guides, Expert viewpoints

We can’t rely solely on traditional MFA methods to prevent determined threat actors — whether they’re external or malicious insiders — from infiltrating our systems. Even if an access code is good for only 10 minutes, that’s typically ample time for a threat …

  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»