Skip to main content

Implementing an Identity Centric Approach

June 19, 2017

With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords, our clients are consistently asking us, are we really immune to a breach?

Despite significant spending on single-point, defense-focused cyber security technologies, companies are still at significant risk. The change in how we do business – more connected, more open, more consumer-based – is making us more vulnerable, and the credential is under attack.  But what if your existing technologies, that inevitably contain information about a user and their transactions, could be integrated to provide a more intelligent approach to authenticating, authorizing and managing users?

ICS Solutions

Organizations need to focus on maturing their identity and access management (IAM) program to cover the main pillars – identity data management, access management, identity management, access governance, privileged access management, and data security and analytics. However, based on business drivers and security policies, implementing an identity centric approach to security is imperative.  

Now is the time to evaluate goals and inventory your existing cyber security technologies.  Armed with that information, you can establish an implementation roadmap that integrates your existing cyber security technologies with your IAM infrastructure. From there, you can create an architecture that can improve your security posture and reduce the risk of a breach due to compromised credentials.  

The Identity Defined Security Alliance (IDSA), founded by Ping Identity in conjunction with Optiv, is a community of technology vendors, solution providers and customers leading the charge in advocating for this new approach to security. The premise focuses on putting identity at the center, using the intelligence of your infrastructure to protect the most vulnerable aspect of your organization. In addition to thought leadership and advocacy, members of the IDSA are collaborating on uses cases, the first of which were published today on the IDSA website.

Most individuals in the security industry agree that the issue is not a matter of if you will be breached but when. Based on 2016 data, that breach most likely will tie back to a credential that has been compromised in some way. 

If you’re at the Cloud Identity Summit in Chicago this week, you can see the IDSA’s approach showcased through a series of technology demos at a lunch-and-learn on Tuesday, June 16 at noon, or at the Optiv booth (218).


    Bryan Wiese

By: Bryan Wiese

Vice President, Identity and Access Management

See More

Related Blogs

December 02, 2013

5 IDaaS Questions Answered

As we start to see more and more potential Identity as a Service (IDaaS) opportunities appear, we’re being asked about IDaaS and its viability. This p...

See Details

August 05, 2013

7 Things to Look for When Hiring Your IAM Manager

Recently, Dave Kearns at KuppingerCole resurrected the concept of an Identity Officer asking at what level in a company it might exist and whether it ...

See Details

July 30, 2013

The 5 Causes of Identity & Access Management Failure

The Identity & Access Management (IAM) space continues to grow and expand to include new technologies, new vendors and new types of customers. With th...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

January 26, 2018

Identity and Access Management Solutions

We help you minimize risk and maximize efficiency with our IAM solutions.

See Details

July 21, 2015

Data Security Solutions

Learn how we can help secure your date throughout its lifecycle.

See Details

May 17, 2017

Identity and Access Management Strategy Workshop

Learn how Optiv can help you align Identity and Access Management initiatives with business goals and best practices.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.