Maintaining corporate security is not easy. How do you model each of your company’s 15 security models in a single place? Moreover, how do you keep it all in sync if each one of the source systems has its own administrator making updates on their own schedule? This is not just “nice to have” functionality now - regulatory and compliance requirements demand it.
The good news is that with the advent of graph databases and streaming services, we can now model arbitrarily deep and complex organizations with different departmental security systems - all maintained in real-time.
By using Role-Based Access Control (RBAC) and Security Information Event Management (SIEM), companies are able to let their employees have access rights only to the information they need to do their jobs and also ensures that they can provide audit-ability and appropriate record keeping for regulatory and compliance purposes. Sign up to join us for the live or recorded discussion where we will cover how all of this plays out using TigerGraph and Kafka.
Why graph databases are ideal for modeling enterprise security and entitlement systems
How updates from source systems can be propagated to the central entitlement system in real time
How to instrument various source security systems to participate in such a comprehensive security model
Why TigerGraph is ideal for this use case and how to use their native Kafka connectors to feed an entitlement system
How to connect all these dots in practice