Letter from Authomize’s CEO on Acquisition by Delinea

| | ciem, Cloud Security, ITDR
Good news everyone, Authomize has been acquired by Delinea.   After four years of building Authomize, we are thrilled to say that we’ve found the right partner to help us in the next ...
4 Steps to Secure Cloud Identities If You’re Stuck

4 Steps to Secure Cloud Identities If You’re Stuck

Don’t know where to start? Feeling stuck in your goal to secure cloud identities? We have a simple strategy we guide customers through at Sonrai. It is built to reduce cloud identity ...
permissions over perimeter blog

An Analysis: 3 Breaches and the Role of Cloud Permissions

| | ciem, Cloud Security, Data breach
Good security has long been about creating a barrier to entry. It’s been about ‘keeping them out.’ The spotlight, attention, and budget, has been dedicated to that pivotal moment – whether the ...

5 Must Have Elements for Cloud Infrastructure Entitlement Management (CIEM)

| | ciem, Non-Human Identities
In this blog, we will lay out what are some of the core features that you should look for in your CIEM solution, along with a couple of helpful questions for consideration ...
Multi Cloud Identity Management: How To Address Security Gaps

Multi Cloud Identity Management: How To Address Security Gaps

| | ciem, Identity & IAM
Multi cloud identity management (IAM) is an increasing reality as a majority of enterprises head towards two or more operating clouds. As businesses expand their cloud estate, the importance of securing identities ...
Sonrai Expert Corner: Identity Proliferation

Here’s Why You Can’t Wait to Buy a CIEM

| | ciem
Reading Time: 8 minutes You can’t wait to buy a Cloud Infrastructure Entitlements Management (CIEM) solution.  Yes, we mean you can’t wait as in time is of the essence and critical threats ...
Sonrai Expert Series: Excessive vs Effective Permissions

You Just Bought Wiz, Here’s What’s Next

| | ciem, least privilege
Reading Time: 5 minutes So you just bought or renewed with Wiz – well done on kicking off your cloud security journey. Cloud security is a multi-pronged program, requiring protection across workloads, ...

Navigating Cloud-Native Application Security: A Multifaceted Approach

Securing cloud environments is a top priority for organizations today. However, merely acknowledging this fact is not enough. Despite 95% of organizations expressing concern about cloud security, only 40% feel confident in ...
Sonrai Expert Corner: Identity Proliferation

CIEM vs IGA: Addressing Cloud Identity Governance

| | ciem, Identity & IAM
Reading Time: 8 minutes Everyone’s goal is the same: protecting enterprise data and resources from malicious attack or exposure. The most efficient way to accomplish that is by managing digital identities and ...
identity based policy

AWS Identity-Based Policy Vs. Resource-Based Policy

| | ciem, Identity & IAM
Reading Time: 7 minutes Granting and Denying Access: Identity-Based Policy Vs. Resource-Based Policy Identity and Access Management (IAM) policies play a pivotal role in controlling access to resources and ensuring the security ...