Security Controls

Making sense of the complex identity and security technologies can be a challenging task and yet an integrated identity and security approach is more effective than a single-point defense approach.  Security Controls are the discrete building blocks for integrating identity and security technologies to create an identity-centric approach to security.  These patterns combine identity and security capabilities that help organizations leverage an identity context to improve security posture.

Share your thoughts on these Security Controls in our on-line community.

Risk-based Authentication

Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).

Risk-based Governance

Access enforcement based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).

Securing Private Web-enabled Applications

Providing a seamless authentication experience and platform for users to access both public and private cloud web-enabled applications.

Risk-based Privilege Access Management

Step-up authentication based on risk posture.

Multiple Authentication Session Device Management

Detection of multiple authentication sessions from different mobile devices.

Risk-based EMM Management

Enterprise Mobility Management device management based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).

Data Protection via Data Security Policies

Web application and data access is secured utilizing Cloud Access Security Broker or Data Access Governance enforcement policies.

Profile-based Authentication

Authentication based on identity profile attribute to determine a higher level of identity assurance.

Profile-based Data Security

Data access based on an identity profile attribute. 

Data Security through Classification Policies

Controlling data encryption via security policy enforcement and/or risk posture.

Privileged Access Management Governance

Provide compliance overview of accounts designated as privileged.