When it comes to graph database security, it’s essential that you have the flexibility to customize every factor of authentication and authorization for your specific deployment. After all, no architecture or organization is the same, so you need the versatility… Learn More →

No matter the size or scope of your graph database, it’s vital to maintain secure control of your data and to keep a record of security events. Starting in Neo4j 3.1 and all future releases, users will have increased control… Learn More →

Neo4j 3.1 supports the LDAP protocol, so you can integrate Neo4j with Active Directory, OpenLDAP or other LDAP-compatible authentication services. Unlike with native users, management of federated users is performed through the external LDAP service. The only aspect of user… Learn More →

In Neo4j 3.1 Enterprise Edition, we introduced a new role-based access control framework for user and application access to the database. The framework enables system administrators to manage permissions and ensure that authenticated users and applications can perform only authorized… Learn More →

Neo4j has broken new ground in database applications with the introduction of the native graph database and the dominant labeled property graph model. As Neo4j has matured, it has inevitably found its way into demanding enterprises who value security alongside… Learn More →

There are several ways that Neo4j can work with Oracle RDBMS (or any other RDBMS). The approach you take depends on what your enterprise is trying to achieve. In this Neo4j and Oracle blog series, we’ll explore how these two… Learn More →

Editor’s Note: This presentation was given by Benjamin Nussbaum at GraphConnect Europe in April 2016. Here’s a quick TL;DR of what he covered: The importance of cloud security The language of security NAT Routing GraphGrid services – Today we’re going… Learn More →

Telenor Norway is the largest supplier of Norway’s telecommunications and data services, but they had run into a major data growth problem. With a growing number of subscriptions, their older identity and access management (IAM) system couldn’t handle the provisioning… Learn More →

For this week’s 5-minute interview, I sat down with Derek Small, the Founder and CEO of Nulli Identity Solution Architects, at GraphConnect San Francisco to discuss how they use Neo4j within identity management. Q: How do you guys use Neo4j… Learn More →

Identity and access management (IAM) solutions store information about parties (e.g., administrators, business units, end-users) and resources (e.g., files, shares, network devices, products, agreements), along with the rules governing access to those resources. Identity management solutions then apply these rules… Learn More →