Digital Identity , Governance & Risk Management , Identity & Access Management
Shift From Perimeter-Based to Identity-Based Security
Vivin Sathyan of ManageEngine on Zero Trust, IAM for Robust Network SecurityOrganizations are moving from traditional perimeter-based security to identity-based security. This shift focuses on continuous identity verification rather than assuming internal users are automatically trusted, said Vivin Sathyan, senior technology evangelist, ManageEngine. It also strengthens security by treating identity management as an ongoing process, he said.
While some organizations prioritize user security, others focus on devices, applications or networks. These varied priorities, Sathyan said, relate to each organization's specific business domain, emphasizing the need for tailored security strategies.
"Legacy applications are a roadblock to implementing IAM or zero trust. One of the core aspects of zero trust is to make sure that even your applications are modernized," he said.
In this video interview with Information Security Media Group, Sathyan also discussed:
- Challenges in managing fragmented identities;
- Robust password policies and multifactor authentication despite the push toward passwordless;
- The need for role-based access control to streamline and secure access.
Sathyan presents POCs and takes care of implementation and product training in the domains of AD Solutions and IT security. He is a regular speaker at international seminars and user conferences conducted by ManageEngine.