Governance & Risk Management , Identity & Access Management , Identity Governance & Administration

Harnessing Identity Data on Your Journey to Zero Trust

Radiant Logic's Wade Ellery on Using Data to Create Trusted Policy-Based Access
Wade Ellery, field chief technical officer and senior evangelist, Radiant Logic

Identity and access management technology has been around for decades, but identity-related breaches happen every day. The problem is not the underlying system. It’s whether organizations can take advantage of the wealth of data within their systems, said Radiant Logic's Wade Ellery, field chief technical officer and senior evangelist at Radiant Logic.

See Also: Securing Access for All Users: Why Every Identity, Including Digital Identities, Has Privileges

"Getting that data together and making sure that data is accurate, actionable and available at the speed of the network is critical to being able to apply deeper security and a more distributed model," Ellery said. "We didn't have to do that previously, but it is now a requirement for any large organization."

The ability to create trusted user profiles and harness user and entity behavior analytics will be key for any organization on a path to zero trust - an approach that emphasizes continuous verification and policy-based access over traditional firewalls. Ellery advised: Don't worry about where you are today.

"As you evolve down the zero trust journey, you'll start to incrementally add additional resources to the access control layer. You'll add more value and information to the knowledge set, and you'll evolve a stronger profile as you move along."

In this video interview with Information Security Media Group, Ellery discusses:

  • The challenges of legacy IAM systems and the path forward with better data;
  • The role of zero trust and policy-based access in stopping cybercriminals;
  • A look into the future of identity and access management.

Ellery has extensive experience in enterprise IT direct and channel software and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance, and IT security challenges.


About the Author

Cal Harrison

Cal Harrison

Editorial Director, ISMG

Harrison helps ISMG readers gain new perspectives on the latest cybersecurity trends, research and emerging insights. A 30-year veteran writer and editor, he has served as an award-winning print and online journalist, mass communication professor and senior digital content strategist for DXC Technology, where he led thought leadership, case studies and the Threat Intelligence Report for the Fortune 500 firm's global security, cloud and IT infrastructure practices.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.