Thanks for Joining Us at Identiverse!

What a great week in Boston at Identiverse! There were so many keynotes, sessions and master classes where identity and security were mentioned in the same sentence. It has not always been the case, and it is our mission to help make the bridge between identity and security seamless for customers looking to implement a zero-trust model. As a proof point, Den Jones and Carlos Martinez discussed their journey to create a zero trust enterprise network for Adobe and how the IDSA will help with future successes. If you missed it, stay tuned to the website for a webcast replay of their session.

We also heard throughout the conference that identity is about integration. There are entirely too many pieces to the identity and security puzzle to think otherwise. Hopefully the IDSA master sessions on Wednesday helped complete some aspects of the picture we are trying to create. If you missed the sessions, stay tuned to the website for a webcast replay. In the meantime, you can check out the slides from each session at the links below.

We’ve accomplished some great things over the last year including:

  • 17 identity and security vendor members and growing
  • 16 identity centric security use cases defined and documented
  • Over 30 integrations that cross identity and security boundaries
  • Over 300 unique identity and security capabilities identified to support an identity centric security approach

But we’re just getting started! Our mission is to be an independent source of education and information on identity centric security strategies, but we can’t do this alone! We hope to harness the best minds in the identity and security industry to help shape the tools and resources available for organizations who are just getting started. Our success will be measured by the number of organizations that have successfully implemented an identity-centric approach to security. Join us in the ongoing discussion and development of bests practices, resources and tools.

Session 1: Access Management Verifies Enterprise Mobility Management Status of Mobile Device
Vendors: Ping Identity and VMware

Session 2: Complete Security for your AWS deployment
Vendors: Okta, Netskope, LogRhythm and CyberArk

Session 3: Adaptive Access Management for Enterprises
Vendors: SecureAuth, Netskope and LogRhythm

Session 4: Delegation of access management and trust elevation for privileged access
Vendors: Gemalto, Ping Identity and BeyondTrust

Session 5: Access Management checks for Cloud Access Security Broker
Vendors: Ping Identity and Netskope

Session 6: Identity Governance Attestation of Privileged Account Management
Vendors: SailPoint, CyberArk and LogRhythm



Let's work together to help everyone become more secure.