Security Architecture Best Practices

Security Architecture Best Practices

What is Neo-Security Architecture and how can you best implement it? Learn about architecting APIs and identity to strengthen network and cloud security.

A security architecture should describe the security design and framework protecting an enterprise's IT infrastructure. Implement a scalable future proof security architecture that allows you to approach the identity landscape for API driven systems the right way

Introducing the Neo-Security Architecture

Introducing the Neo-Security Architecture

Learn what the Neo-Security Architecture is and how it ensures easy integration, future scalability, API Security and secure identity management.

Glossary of Identity Management Terms

Glossary of Identity Management Terms

All the terminology of Identity Management and Neo-Security: Authentication, Authorization, Tokens, DCR, SCIM and more.

Federation Requirements Introduced in FIPS 201-3

Federation Requirements Introduced in FIPS 201-3

An overview of FIPS 201-3 and SP 800-C3, listing the requirements and explaining how OpenID Connect fits into the picture.

Open Policy Agent: Integration Overview

Open Policy Agent: Integration Overview

What is Open Policy Agent (OPA) and how does it work? Find out how Curity's Identity Server and OPA can create strong user authentication.

What is an Entitlement Management System? A Brief Overview

What is an Entitlement Management System? A Brief Overview

What is an Entitlement Management System, what are the functions and what components does it include?

The Token Handler Pattern for Single Page Applications

The Token Handler Pattern for Single Page Applications

Learn how the Token Handler design pattern strengthens the security of your Single Page Applications and improves user experience.

Zero Trust Architecture is a Token-Based Architecture

Zero Trust Architecture is a Token-Based Architecture

What is Zero Trust Architecture (ZTA), and why is it essential to implement Zero Trust Security to protect your resources? Build a Zero Trust Model.

Privacy and GDPR Using OAuth

Privacy and GDPR Using OAuth

How to comply with privacy regulations and GDPR, using OAuth. Incorporate User Privacy Design in your organization's architecture to keep data safe and meet regulations.

Integrate Identity with Business Data

Integrate Identity with Business Data

Protect business data with an Identity and Access Management System. In this article, we provide design choices and guide you through the integration process.

CIAM vs IAM: What's the Difference?

CIAM vs IAM: What's the Difference?

Explores the difference between CIAM and IAM, as well as the common security requirements and behaviors needed for digital solutions.

Identity and Access Management Primer

Identity and Access Management Primer

Basic IAM concepts and practical advice on how best to implement Identity and Access Management for a small business.

Authentication vs. Authorization, What’s the Difference?

Authentication vs. Authorization, What’s the Difference?

Authentication and authorization are two security processes used to protect systems and information. This article outlines what they mean and their differences.

What is an API Management System? A Brief Overview

What is an API Management System? A Brief Overview

What is an API Management System, what does it do, and what services does it contain?

What is an Identity Management System?

What is an Identity Management System?

An overview of the Identity Management System, and its main components: authentication service, token service, federation and user management service.

Curity and the Neo-Security Architecture

Curity and the Neo-Security Architecture

The Neo-Security Architecture is a modular security architecture. Learn how an Identity Management System like the Curity Identity Server fits in this adaptive security architecture.