September 26th Webcast: The Case for Identity Centric Security - Adobe’s Path to ZEN
Join us for our first ever live IDSA Webcast on September 26th, 2018 at 11:30am MT. Join Adobe's Den Jones, Director of Enterprise Security, and Carlos Martinez, Sr. Systems Engineer, to hear how they overcame the struggle to find the balance between a pleasant user experience and stringent security requirements through a Zero-trust Enterprise Network (ZEN) approach.
Watch the replay:
Read more about the webinar....
User authentication has become increasingly complex over the years, blending usernames and passwords with second factor authentication, like One Time Passwords (OTP). In many cases users need to re-authenticate many times a day depending on the applications or devices they use. For many users extremely long and complex passwords blend across work and personal accounts which reduce security and increase frustration and confusion. Is it even possible to balance heightened security and enhance the overall user experience? Using the concepts of an identity centric approach to security from the Identity Defined Security Alliance (IDSA), Adobe has developed a Zero-Trust framework for achieving this balance, through “ZEN.” The Zero-Trust Enterprise Network (or ZEN) project from Adobe is an initiative based upon numerous best practices and principles from various digital workspaces, including the IDSA.
In this session you will learn the drivers behind the ZEN initiative and how it accomplishes the following
- Remove the need for VPN and replace usernames/passwords with a certificate-based authentication and multiple options for second factor authentication (2FA). 2FA will only be required as needed based security policies.
- Leverage existing device management and network controls combined with machine learning to control access.
- Help prevent unwanted lateral movement within the network during an incident or breach scenario.
- Better automate management of access to internal applications to streamline the overall user experience while also tightening security controls.
- Deploy a “trust score engine” that will better automate access rules based upon real-time data.