Tagged articles
5 articles
Page 1 of 1
Ops Development & AI Practice
Ops Development & AI Practice
Jun 27, 2025 · Industry Insights

How Teleport Stacks Up Against the Rising Access Management Titans

Teleport aims to replace VPNs, bastion hosts, and access gateways, but faces stiff competition from direct rivals like HashiCorp Boundary, StrongDM, and Tailscale, as well as native solutions from AWS, Google Cloud, and Azure, each offering distinct strengths and ecosystem lock‑ins.

Access ManagementCloud NativeInfrastructure Security
0 likes · 10 min read
How Teleport Stacks Up Against the Rising Access Management Titans
Efficient Ops
Efficient Ops
Mar 28, 2024 · Information Security

Unlocking Organizational Security: New Identity Governance Maturity Model Standards

Amid growing organizational complexity and rising security incidents, the China Academy of Information and Communications Technology and leading enterprises have launched the Identity Governance Capability Maturity Model series standards—detailing evaluation frameworks, levels, and processes—to help organizations assess and improve identity governance, with open registration for 2024 assessments.

Access ManagementIdentity Governanceevaluation process
0 likes · 6 min read
Unlocking Organizational Security: New Identity Governance Maturity Model Standards
Ops Development Stories
Ops Development Stories
Apr 22, 2019 · Information Security

How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them

This article explains the MAC learning and aging processes, demonstrates MAC flooding and ARP spoofing attacks with practical test setups, and provides step‑by‑step configurations such as port security, access management, and DHCP snooping to protect network switches from these threats.

ARP spoofingAccess ManagementDHCP snooping
0 likes · 10 min read
How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them
Beike Product & Technology
Beike Product & Technology
Sep 30, 2017 · Information Security

Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM

The article describes the challenges of resource isolation and permission management in a microservice environment, explains AWS IAM concepts and policies, and details the design, development, and expected benefits of the internally built OpenIAM service for unified authentication and authorization across services.

AWSAccess ManagementIAM
0 likes · 9 min read
Design and Implementation of OpenIAM: A Cloud Identity and Access Management Service Inspired by AWS IAM