As applications, data and infrastructure continue moving into the cloud, the need for authorization of users to have the right access at the right time increases. The new enterprise is a hybrid of cloud and on-premise deployments all requiring a vetted, comprehensive and scalable access control model. The next line of defense is the run-time authorization service, which ideally uses an attribute and policy-based approach to enforce access rules on APIs, microservice and data services. Lets explore how these two technologies can work in concert to uncover hidden value for enterprise customers.”]

