This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage access and monitor risk. But when it comes to executing identity processes and decisions, our latest research reveals that 96% of organizations still rely on manual workflows. …
Archives
-
What is Next-Gen IGA?
Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different? Let’s start with a trip on the way back machine and look at the evolution of these technologies to date. Skipping past the work on e-mail…
-
SailPoint: How identity security can be a business accelerator.
This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…
-
Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP)
For today’s enterprises, security must adapt to the dynamic needs of the environments and the users. That takes integration and the ability to use everything from device characteristics to user behavior to make decisions about access and authentication. However, this integration and interoperability can be hard to come by. As organizations look to Zero Trust…
-
The Identity Threat Detection and Response Lifecycle
Identity pros have long understood that identity is the new security perimeter. Identity systems like Active Directory (AD)—the primary identity store in use today—are primary targets for cyberattacks. By gaining access to AD, attackers can eventually grab the types of elevated privileges necessary to steal company and user data and intellectual property and to lock…