Governance & Risk Management , Identity & Access Management , Identity Governance & Administration
Harnessing Identity Data on Your Journey to Zero Trust
Radiant Logic's Wade Ellery on Using Data to Create Trusted Policy-Based AccessIdentity and access management technology has been around for decades, but identity-related breaches happen every day. The problem is not the underlying system. It’s whether organizations can take advantage of the wealth of data within their systems, said Radiant Logic's Wade Ellery, field chief technical officer and senior evangelist at Radiant Logic.
See Also: Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR
"Getting that data together and making sure that data is accurate, actionable and available at the speed of the network is critical to being able to apply deeper security and a more distributed model," Ellery said. "We didn't have to do that previously, but it is now a requirement for any large organization."
The ability to create trusted user profiles and harness user and entity behavior analytics will be key for any organization on a path to zero trust - an approach that emphasizes continuous verification and policy-based access over traditional firewalls. Ellery advised: Don't worry about where you are today.
"As you evolve down the zero trust journey, you'll start to incrementally add additional resources to the access control layer. You'll add more value and information to the knowledge set, and you'll evolve a stronger profile as you move along."
In this video interview with Information Security Media Group, Ellery discusses:
- The challenges of legacy IAM systems and the path forward with better data;
- The role of zero trust and policy-based access in stopping cybercriminals;
- A look into the future of identity and access management.
Ellery has extensive experience in enterprise IT direct and channel software and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance, and IT security challenges.