Co-Founder & CPO
2:50 PM Unifying IAM and Network Security: A New Model to Secure Access to Corporate Resources in Distributed Environments
The enterprise environment is becoming hybrid and distributed, with over 80% of enterprises adopting the cloud, mobile access and remote workforce. As a result, the traditional network perimeter solutions such as VPNs and DMZs can no longer provide the security, flexibility and agility required for the modern business and adequately protect the organizations’ assets.
To address these business needs, the security architecture must shift from the network level focus to the identity, device and applications level. Leveraging such architecture an organization can enforce an easy-to-manage access policy that is unified regardless of where the users, devices or applications are located. With this shift, an organization can also apply the Zero Trust security model, just like Google did with their BeyondCorp model.
The discussion will include:
•What are the building blocks of the new architecture? How can you combine identity-as-a-service and device management with network level security? What are the alternatives and the related pros and cons?
•How can the unified architecture support the modern organization’s security, flexibility and agility requirements? How would this help you to achieve a complete Zero Trust security model – including a detailed walkthrough.
•Real world case studies of: operations team access
(DevOps), third party access, M&A IT integration and cloud migration based on user, device and application context.