Zero trust is worth the effort, he argues. It improves security, compliance, and risk management, while also simplifying operations — when implemented correctly — and potentially allowing organizations to reduce administrative overhead, costs, and user latency and frustration. It also makes it easier to manage hybrid and remote work.
In the meantime, enterprises need to continue investing in MFA, identity management and governance, privileged access management, and single sign-on, to name a few. This may force CIOs to act on two “dimensions” — one that focuses on improving identity and access security now, and the other, longer-term goal of moving toward zero trust.
Over time, intelligence to identify unusual user behavior or actions that may indicate a breach, as well as a move toward risk-based IAM rather than identity-based IAM. This is sometimes referred to as adaptive authentication.
“By integrating real-time risk assessment, organizations will be able to grant access based on context, not just identity,” said John Paul Cunningham, CISO at Silverfort. “This shift will reduce operational costs and the data burden associated with managing authentication and authorization. Ultimately, moving to this model will allow belgium mobile database to strengthen security, improve user experience, and reduce the cost of maintaining identity security.”
In practice, organizations will likely rely on security levels for access levels, at least for now.
Digital wallets
“The more forward-thinking organizations are putting identity first. But there’s still the challenge of connecting disparate systems,” Cunningham says. “In the future, you’ll be able to build on new platforms, but people still have a lot of legacy architecture.”
However, businesses still need to verify the identity of the user first and foremost – whether that user is an employee, supplier or customer. This is where the move to global identity wallets (GIWs), typically part of a government-backed system for storing and using digital documents to identify individuals, can help.
GIWs are most often associated with digital government initiatives and may not be the most appropriate tool for day-to-day access management, but they can play a role in onboarding employees or customers, and potentially reducing fraud and credential theft. There is already some convergence between GIWs and IAM, with Microsoft’s Entra Verified ID integrated into the company’s Authenticator app.
This will include greater use of artificial
-
- Posts: 535
- Joined: Mon Dec 23, 2024 3:13 am