11
ZERO TRUST IDENTITY

ZERO TRUST IDENTITY - Bringing Identity

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

ZERO TRUST IDENTITY

Identity is the Center of Security– The Future is Now!– Zero Trust Identity

• Users Data, and Devices are uniquely tied together

• Users and devices are untrustworthy

SESSIONSTime Session Partners

2:30 Access Management Verifies Enterprise Mobility Management Status of Mobile Device

Ping / Vmware

3:00 Complete Security for your AWS deployment Okta / Netskope / LogRhythm / CyberArk

3:30 Adaptive Access Management for Enterprises SecureAuth / Netskope / LogRhythm

4:00 Delegation of Access Management and trust elevation for privileged access

Gemalto / Ping / BeyondTrust

4:30 Access Management checks for Cloud Access Security Broker

Ping / Netskope / Optiv

5:00 Identity Governance Attestation of Privileged Account Management

SailPoint / CyberArk / LogRhythm

• Problem – Provide secure access to resources based on the

managed status of a mobile device and whether it has been compromised.

• Zero Trust Capabilities– Never trust the user, verify that the user passes

multiple authentication steps and is using a managed, non compromised device.

– Limit Privileges

• IDSA Use Cases– Access Management Verifies Enterprise Mobility

Management Status of Mobile Device

VERIFY THE USER, VERIFY THE DEVICE

ARCHITECTURE SLIDE

DEMO FLOW• User attempts to access application from mobile device

• Ping checks for authentication, sends user to VMWare to check on mobile device status

• If enrolled, Ping authenticates

• If not enrolled, Ping performs MFA, sends user back to enroll, and then authenticates

+

AccessManagement

Identity Governance

Identity Administration

SIEM

EMMDLP

CASBPAM

GRC

Network Security

UEBA

Service Mgmt

Fraud & RiskDAG

IDENTITY SECURITY

Access Management Verifies EMM Status of Mobile Device

DEMO

QUESTIONS

MEMBERS

THANK YOU

For more information https://www.idsalliance.org