-
Baton and the Journey to Identity Security and Unified Access Control
·Alex BoveeTo realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.Read More -
Technical Deep Dive: Using Baton to Audit Infrastructure Access
·John DegnerGetting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.Read More -
Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access
·Paul QuernaAnnouncing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.Read More -
Achieve Least Privilege Access with ConductorOne + Okta
·Samira KahangiLearn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOneRead More -
How to Be SOC2 Compliant: A Checklist for Security Teams
·Shanelle RuckerYour first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.Read More -
Birthright Access is Broken
·Alex BoveeBirthright access is an anti-pattern for secure, least privilege access control.Read More -
Running Your UAR Campaigns: Product Deep Dive
·Marissa EndresFollowing our last post on scoping UARs with ConductorOne, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.Read More -
Architecting Zero Trust: Twingate + ConductorOne
·Marissa EndresTwingate and ConductorOne partnered to provide customers with a Zero Trust solution that gives you just-in-time, time-based remote access to your private resources and networks.Read More -
Scoping Your UAR Campaigns: Product Deep Dive
·Marissa EndresWe're breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with ConductorOne.Read More