Archives
-
Disconnected Apps: The Gap in Your Zero Trust Strategy
Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless disconnected apps lurk in the background, posing significant risks to your organization. What Are disconnected…
-
Building Zero Trust Security Posture for Secure Privileged Access Management Journey
This blog was originally posted by Arcon on their blog page. You can read the original here. Overview Today, we are experiencing a growing assortment of applications, systems, APIs, and data that is scattered across IT networks in distributed IT infrastructure and multi-cloud environments. This assortment of critical information is constantly at risk from unauthorized…
-
How Modern IGA Supports the Zero Trust Security Model
By now, everyone is familiar with the Zero-Trust security model. The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…
-
Incorporating Machine Identities into an Identity-Centric Strategy
The importance of machine identities and non-person entities (or non-human identities) in the enterprise is often overlooked. Machine identities govern the confidentiality and integrity of information [flow] between machines. To ensure their unique identities, machines use keys and certificates, similar to people’s use of usernames and passwords (source Venafi). Automation is being used to drive…