Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
- LANGUAGE: English DATE: Tuesday, June 26, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
With the explosion of cloud delivered applications and an increasing need to address the user sign-on challenges it involves, there has been a focus on establishing user authentication as the new perimeter. For years, security experts have been talking about the five A’s of Security: Authentication, Authorization, Administration, Analytics and Audit. With the increased focus on the first A – Authentication, it is essential that this is supported by the other four disciplines with the appropriate level of separation between them.
In this KuppingerCole webinar, we will address:
- The challenges of keeping IT security current with the latest technology advancements
- The five A’s of user-centric security
- Understanding why even the strongest authentication alone does not solve identity security
- The importance of focusing on identity governance to address the full lifecycle of identity and access manageme
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain how identity can become the center of your security strategy and will give an overview of the complex authorization challenges.
In the second part, Darran Rolls, CTO and CISO at SailPoint, will present his perspective on the potential pitfalls of adopting an authentication-centric architecture, without the appropriate support of identity governance.
SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.