Making sense of the complex identity and security technologies can be a challenging task and yet an integrated identity and security approach is more effective than a single-point defense approach. Security Controls are the discrete building blocks for integrating identity and security technologies to create an identity-centric approach to security. These patterns combine identity and security capabilities that help organizations leverage an identity context to improve security posture.
Share your thoughts on these Security Controls in our on-line community.
Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).
Access enforcement based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).
|Securing Private Web-enabled Applications
Providing a seamless authentication experience and platform for users to access both public and private cloud web-enabled applications.
|Risk-based Privilege Access Management
Step-up authentication based on risk posture.
|Multiple Authentication Session Device Management
Detection of multiple authentication sessions from different mobile devices.
|Risk-based EMM Management
Enterprise Mobility Management device management based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).
|Data Protection via Data Security Policies
Web application and data access is secured utilizing Cloud Access Security Broker or Data Access Governance enforcement policies.
Authentication based on identity profile attribute to determine a higher level of identity assurance.
|Profile-based Data Security
Data access based on an identity profile attribute.
|Data Security through Classification Policies
Controlling data encryption via security policy enforcement and/or risk posture.
|Privileged Access Management Governance
Provide compliance overview of accounts designated as privileged.