Locking It Down with Extended Access Management

Jason Meller, a vice president of product management at 1Password, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss what happens when you merge identity and access management to reflect workers’ new realities.

14 Min View

Jason Meller, a vice president of product management at 1Password, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss what happens when you merge identity and access management to reflect workers’ new realities — and their persistent bad habits, including downloading unsanctioned apps and using the same computer for work and personal needs. He talks extended access management (XAM) and its embrace of end-user remediation of security issues, and calls out current security practices we’re sure to find outdated in five years. Meller also speaks to the future of access management and what we night expect there.

Jason Meller is a Vice President of Product Management at 1Password. Prior to joining 1Password, Jason was the founder and CEO of Kolide, an endpoint security company that 1Password acquired in 2024. Jason has spent his career building technology that enables security and IT professionals to protect their organizations, while still respecting end user productivity, agency, and privacy. Jason started his security and product career at GE's elite computer incident response team. From there, Jason moved to the legendary Mandiant Corporation (acquired by FireEye) quickly working his way up from an entry-level analyst position to becoming the Chief Security Strategist. At Kolide, Jason built a successful and trusted company, whose device trust solution is now a major component of 1Password’s Extended Access Management. Now, as part of 1Password, Jason and his team are helping to create the next generation of security tools, which protect data, empower users, and drive business outcomes.


About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights