Identity & IAM - Tagged - Security Boulevard
Effective Permissions: Fact vs. Fiction image for public cloud enterprise

What Are AWS Effective Permissions?

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud. The post What Are AWS Effective Permissions? appeared first on Sonrai Security ...
CIEM: Yet Another Security Acronym image for Cloud infrastructure Management

CIEM: Yet Another Security Acronym

Cloud Infrastructure Entitlement Management (CIEM) brings identity management to a new level. First-generation Cloud Identity Access Management (IAM) approaches do […] The post CIEM: Yet Another Security Acronym appeared first on Sonrai ...
CCOE blog post image with a cloud team long image Cloud Center of Excellence (CCOE)

How to Build a Cloud Center of Excellence

As more enterprises move to the cloud, leading cloud service providers, like Amazon Web Services (AWS), Microsoft Azure, and Google […] The post How to Build a Cloud Center of Excellence appeared ...
What is CIEM? What is Cloud Infrastructure Entitlement Management (CIEM)? image to help explain

What is CIEM and Why Should Enterprises Make it a Priority?

Global spending on cloud service providers is set to increase in 2021 by 18.4% to $304.9 billion, up from $257.5 […] The post What is CIEM and Why Should Enterprises Make it ...
WFS migrated to the cloud and closed 20 of 22 data centers by partnering with Sonrai enterprise cloud security platform

WFS Securely Changes Technology Approach

Event Recap: Sandy Bird, Co-Founder & CTO of Sonrai Security, participated in an AWS showcase for cloud-scale data leaders. The post WFS Securely Changes Technology Approach appeared first on Sonrai Security ...
Webinar Recap: The Challenge of Non-People Identities

Webinar Recap: The Challenge of Non-People Identities

| | Identity & IAM
Did you miss our recent non-people identity webinar series? This three-part webinar highlighted crucial cloud security elements about managing non-people […] The post Webinar Recap: The Challenge of Non-People Identities appeared first ...
The Benefits of Conducting Identity Access Reviews

The Benefits of Conducting Identity Access Reviews

To effectively manage identity and access in public cloud, enterprises should conduct an access review. The post The Benefits of Conducting Identity Access Reviews appeared first on Sonrai Security ...
Learn the shared responsibility model and how it differs by cloud service provider

Share the Responsibility to Avoid A Data Breach

Gain a detailed understanding of the shared responsibility model requirements, which differ by CSP. The post Share the Responsibility to Avoid A Data Breach appeared first on Sonrai Security ...
2021 Cloud Computing Product

Sonrai Dig Wins Product of the Year Award

TMC, a global, integrated media company helping clients build communities in print, in-person, and online, today announced Sonrai Dig as […] The post Sonrai Dig Wins Product of the Year Award appeared ...
Cloud Security for Non-Human identities and Serverless Identities image

Cloud Security for Non-Human Serverless Identities

The serverless model shifts security focus to identities, effective permissions, and data access. The post Cloud Security for Non-Human Serverless Identities appeared first on Sonrai Security ...