Cloud and Security
Facebook Twitter LinkedIn

Cloud and Security

Combined Session
Tuesday, September 14, 2021 14:30—15:30
Location: EIC CAFÉ

Entitlement Management across Hybrid Cloud for Security & Compliance

Companies across the globe are undergoing digital transformation. The main challenge with this approach is the ability to securely manage access for on-premise, cloud and SaaS applications. Entitlement Management across this hybrid landscape requires management of cloud assets, IAM profiles, groups, roles and entitlements in support of Identity Lifecycle Management, Access Management, and Access Governance.

Workloads have been running in the cloud since the last decade or so. AWS, GCP and Azure have replaced traditional data centers and companies continue to migrate their production workloads to cloud at blistering pace. So, what changed? Firstly, we are starting to realize that this cloud infrastructure model necessitates a different type of identity and access management solutions as native solutions don’t cover multi-cloud IaaS model and traditional IGA solutions fall short in their scope. Secondly, business goals and priorities are driving engineering teams to work on initiatives without formal approval and oversight. With IaaS it is easy to spin up an instance, assign various resources. As organizations aren’t centrally controlling these spin offs, any vulnerabilities in this growing shadow IT is a target for hackers.

SecurEnds enables entitlement management across hybrid cloud assets for security and compliance.

1. Provide visibility over hybrid-cloud assets
Discover all identities, service accounts, IAM users, roles and policies within single or hybrid cloud the IaaS infrastructure.
See the granular permissions held by IAM Users, Roles and Service Accounts. This is important to define least privilege policies.
2. Provide governance over hybrid-cloud assets
Enforce least privilege policies across all cloud identities to avoid privilege creep.
Routine audits of configurations across cloud environments helps with policy enforcement and compliance.
3: Provide remediation over hybrid-cloud assets
Post identity review kick off automation to rectify privileges

Austin Baker
Austin Baker
SecurEnds
Austin leads the sales and strategic partnership efforts at SecurEnds. He has a diverse background aligning multiple business units in various industries to create cohesive technology strategies....

Zero Party Data - knowing without controlling

Applying the principles of self-sovereign identity to financial and social media sourced data points will enable businesses to make better and informed decisions about retention, acquisition and eligibility whilst relieving them of most of their obligations under GDPR.

Julian Wilson
Julian Wilson
Valido Limited
Julian has been a ‘product guy’ since his time at Apple in the late 80s. He has worked on many world firsts from set top boxes and internet games consoles and Newton whilst at Apple: to...

Tickets

On-Demand Access
Re-live EIC 2021
€100
 
Watch more than 250 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address