zero trust identity - bringing identity
TRANSCRIPT
Identity is the Center of Security– The Future is Now!– Zero Trust Identity
• Users Data, and Devices are uniquely tied together
• Users and devices are untrustworthy
SESSIONSTime Session Partners
2:30 Access Management Verifies Enterprise Mobility Management Status of Mobile Device
Ping / Vmware
3:00 Complete Security for your AWS deployment Okta / Netskope / LogRhythm / CyberArk
3:30 Adaptive Access Management for Enterprises SecureAuth / Netskope / LogRhythm
4:00 Delegation of Access Management and trust elevation for privileged access
Gemalto / Ping / BeyondTrust
4:30 Access Management checks for Cloud Access Security Broker
Ping / Netskope / Optiv
5:00 Identity Governance Attestation of Privileged Account Management
SailPoint / CyberArk / LogRhythm
• Problem – Provide secure access to resources based on the
managed status of a mobile device and whether it has been compromised.
• Zero Trust Capabilities– Never trust the user, verify that the user passes
multiple authentication steps and is using a managed, non compromised device.
– Limit Privileges
• IDSA Use Cases– Access Management Verifies Enterprise Mobility
Management Status of Mobile Device
VERIFY THE USER, VERIFY THE DEVICE
DEMO FLOW• User attempts to access application from mobile device
• Ping checks for authentication, sends user to VMWare to check on mobile device status
• If enrolled, Ping authenticates
• If not enrolled, Ping performs MFA, sends user back to enroll, and then authenticates
+
AccessManagement
Identity Governance
Identity Administration
SIEM
EMMDLP
CASBPAM
GRC
Network Security
UEBA
Service Mgmt
Fraud & RiskDAG
IDENTITY SECURITY
Access Management Verifies EMM Status of Mobile Device