Using GraphQL for Digital Identity & Access Management
By Allison Wu
March 11, 2020 16 mins read
Learn how to build IAM solutions using GrandStack and GraphQL, and explore how graphs are helpful in real-time access management decisions.
Explore: API explosion Data Relationships GRANDstack graphconnect GraphQL graphs for identity iam identity identity and access management IRM
Connecting the Complexity of Identity and Access Management
By Jocelyn Hoppa
September 2, 2019 4 mins read
Learn how speed makes graph-based IAM particularly applicable for applications with large audiences, many resources and complex connections.
Explore: connected devices enterprise applications graph database graph technology iam IAM solutions identity and access management neo4j query response Telenor
Graph Algorithms in Neo4j: Use Cases for Graph Transactions & Analytics
By Jocelyn Hoppa
November 5, 2018 5 mins read
Today’s most pressing data challenges center around connections, not just tabulating discrete data. Graph analytics accelerate breakthroughs across industries with more intelligent solutions. This blog series is designed to help you better leverage graph analytics so you can effectively innovate… Read more →
Explore: ai customer 360 eBay fraud detection graph algorithms Graph Analytics identity and access management Network Monitoring real-time recommendations Social Networks
This Week in Neo4j – Neo4j ETL Guide Refresh, New Release of APOC and JDBC Driver, Blockchain Analytics
By Mark Needham
August 11, 2018 4 mins read
Welcome to this week in Neo4j where we round up what’s been happening in the world of graph databases in the last 7 days. This week we have releases of APOC and the Neo4j JDBC Driver, a paper explaining how… Read more →
Explore: APOC biological knowledge data modeling ETL tool identity and access management tom sawyer twin4j webgl
Financial Services & Neo4j: Identity & Access Management
By Bryce Merkl Sasaki
July 24, 2017 4 mins read
Within the IT organization of any financial services enterprise, identity and entitlements management must be managed to minimize risk. Over time, the centralized entitlements structure – whether represented in Active Directory or an LDAP directory – grows in such a… Read more →
Explore: access management Active Directory Connected Data financial services fraud prevention identity and access management identity management Information Security LDAP directory permissions management