Locking It Down with Extended Access Management
Jason Meller, a vice president of product management at 1Password, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss what happens when you merge identity and access management to reflect workers’ new realities.
May 15, 2024
Jason Meller, a vice president of product management at 1Password, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss what happens when you merge identity and access management to reflect workers’ new realities — and their persistent bad habits, including downloading unsanctioned apps and using the same computer for work and personal needs. He talks extended access management (XAM) and its embrace of end-user remediation of security issues, and calls out current security practices we’re sure to find outdated in five years. Meller also speaks to the future of access management and what we night expect there.
Jason Meller is a Vice President of Product Management at 1Password. Prior to joining 1Password, Jason was the founder and CEO of Kolide, an endpoint security company that 1Password acquired in 2024. Jason has spent his career building technology that enables security and IT professionals to protect their organizations, while still respecting end user productivity, agency, and privacy. Jason started his security and product career at GE's elite computer incident response team. From there, Jason moved to the legendary Mandiant Corporation (acquired by FireEye) quickly working his way up from an entry-level analyst position to becoming the Chief Security Strategist. At Kolide, Jason built a successful and trusted company, whose device trust solution is now a major component of 1Password’s Extended Access Management. Now, as part of 1Password, Jason and his team are helping to create the next generation of security tools, which protect data, empower users, and drive business outcomes.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024