{"id":615963,"date":"2023-03-09T08:49:14","date_gmt":"2023-03-09T14:49:14","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/03\/09\/access-management-must-get-stronger-in-a-zero-trust-world\/"},"modified":"2023-03-09T08:49:14","modified_gmt":"2023-03-09T14:49:14","slug":"access-management-must-get-stronger-in-a-zero-trust-world","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/03\/09\/access-management-must-get-stronger-in-a-zero-trust-world\/","title":{"rendered":"Access management must get stronger in a zero-trust world"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2023-03-08T18:18:57+00:00\" datetime=\"2023-03-08T18:18:57+00:00\">March 8, 2023 10:18 AM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2022\/03\/zero-trust.jpg?fit=750%2C375&#038;strip=all\" alt=\"Zero Trust Icon  In The Paper Browser Window Frame.\"><\/p>\n<div>\n<p><em>Image Credit: Getty Images<\/em><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2861408\">\n<div>\n<p>Access management (AM) done right is the fuel for successful digital transformation. Identities and AM are core to earning customers\u2019 trust \u2014 a must for digital-first initiatives to get a strong start and deliver revenue.<\/p>\n<p>AM and identities must be granular, role-based and as just-in-time as possible. Enterprises achieving that today are seeing <a href=\"https:\/\/venturebeat.com\/security\/zero-trust-is-critical-as-more-enterprises-sacrifice-security-for-speed\/\">zero-trust<\/a> security frameworks becoming instrumental in digitally-driven revenue growth.\u00a0<\/p>\n<p>CISOs tell VentureBeat their <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\">cybersecurity<\/a> budgets are linked more closely than ever to protecting digital transformation revenue gains. And they see working to <a href=\"https:\/\/venturebeat.com\/security\/how-cisos-can-drive-revenue-gains-and-advance-their-careers\/\">grow digital-first revenue channels as a career growth opportunity<\/a>.<\/p>\n<p>Security and risk management professionals must turn AM into cybersecurity strength, and show that zero-trust frameworks are adaptive and flexible in protecting new digital customer identities. <a href=\"https:\/\/venturebeat.com\/security\/how-to-use-zero-trust-and-iam-to-defend-against-cyberattacks-in-an-economic-downturn\/\">Zero trust<\/a>\u00a0contributes to securing every identity and validating that everyone using a system is who they say they are.\u00a0Earning and growing customer trust in a zero-trust world starts with a strong AM strategy that scales as a business grows.\u00a0<\/p>\n<p>Authorization, adaptive access and getting directory and identity synchronization right also become significant challenges as an organization gets larger.<\/p>\n<h2 id=\"h-securing-identities-is-core-to-digital-transformation\"><strong>Securing identities is core to digital transformation\u00a0<\/strong><\/h2>\n<p>\u201cAdding security should be a business enabler. It should be something that adds to your business resiliency, and it should be something that helps protect the productivity gains of digital transformation,\u201d said George Kurtz, cofounder and CEO of\u00a0<a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a><a href=\"https:\/\/www.crowdstrike.com\/\">,<\/a> during his company\u2019s <a href=\"https:\/\/venturebeat.com\/security\/crowdstrikes-platform-plan-at-fal-con-melds-security-and-observability\/\">annual event last year<\/a>. Boards of directors and the CEOs who report to them are starting to look at zero trust not purely as a risk-reduction strategy.<\/p>\n<p>CIOs and CISOs tell VentureBeat that they are now including zero trust in the first phases of digital transformation projects. And getting AM right is essential for delivering excellent customer experiences that scale safely in a zero-trust world.\u00a0<\/p>\n<p>\u201cWhile CISOs need to continue working on translating technology and technical risk into business risk and \u2026 better deliver that risk story to their board, on the other side of the aisle, we need the board to be able to understand the true implication of cyber risk on the ultimate shareholder value and business goals,\u201d said <a href=\"https:\/\/duo.com\/decipher\/cisos-board-members-and-the-search-for-cybersecurity-common-ground\">Lucia Milica, global <\/a><a href=\"https:\/\/duo.com\/decipher\/cisos-board-members-and-the-search-for-cybersecurity-common-ground\" target=\"_blank\" rel=\"noreferrer noopener\">resident<\/a><a href=\"https:\/\/duo.com\/decipher\/cisos-board-members-and-the-search-for-cybersecurity-common-ground\"> CISO at Proofpoint<\/a>.<\/p>\n<h2 id=\"h-excel-at-protecting-identities-to-make-your-brand-more-trusted\"><strong>Excel at protecting identities to make your brand more trusted\u00a0<\/strong><\/h2>\n<p>It doesn\u2019t take much to lose a customer\u2019s trust forever. One thing most can\u2019t look past is being personally victimized by having their identities compromised during a breach. <a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\" target=\"_blank\" rel=\"noreferrer noopener\">Sixty<\/a><a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\">-nine percent<\/a> will stop buying from brands that use their data without permission. <a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\">Sixty-<\/a><a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\" target=\"_blank\" rel=\"noreferrer noopener\">eight<\/a><a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\"> percent<\/a> leave if their data-handling preferences are violated, and <a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\">66<\/a><a href=\"https:\/\/business.adobe.com\/resources\/reports\/adobe-trust-report.html?sdid=FD1KZJ3H&#038;mv=other\" target=\"_blank\" rel=\"noreferrer noopener\">%<\/a> leave a brand forever if a breach puts their identity data at risk. Gen Z is by far the least forgiving of all customer segments, with <a href=\"https:\/\/www.prnewswire.com\/news-releases\/55-of-online-consumers-distrust-brands-with-their-personal-information-2023-optimove-survey-301731505.html\">60<\/a><a href=\"https:\/\/www.prnewswire.com\/news-releases\/55-of-online-consumers-distrust-brands-with-their-personal-information-2023-optimove-survey-301731505.html\" target=\"_blank\" rel=\"noreferrer noopener\">%<\/a> saying they\u2019ll never buy again from a brand that breaches their trust. Over time, it takes a series of consistent experiences to earn customers\u2019 trust, and just one breach to lose it.\u00a0<\/p>\n<p>Joe Burton, CEO of identity verification company <a href=\"https:\/\/www.telesign.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Telesign<\/a>, has a customer-centric perspective on how access management must be strengthened in a zero-trust environment. In a recent interview, <a href=\"https:\/\/venturebeat.com\/security\/creating-secure-customer-experiences-with-zero-trust\/\">Burton told VentureBeat<\/a> that while his company\u2019s customers\u2019 experiences vary significantly depending on their digital transformation goals, it is essential to design cybersecurity\u00a0and zero trust into their workflows.<\/p>\n<p>Enza Iannopollo, principal analyst at Forrester, told VentureBeat that privacy and trust have never depended more on each other, reinforcing the importance of getting AM right in a zero-trust world. As Iannopollo wrote in <a href=\"https:\/\/www.lastwatchdog.com\/guest-essay-achieving-trust-in-a-tumultuous-2023-thats-sure-to-come-can-lead-to-success\/\">a recent blog <\/a><a href=\"https:\/\/www.lastwatchdog.com\/guest-essay-achieving-trust-in-a-tumultuous-2023-thats-sure-to-come-can-lead-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">post<\/a>, \u201cCompanies understand that trust will be critical in the next 12 months\u00a0<strong>\u2014<\/strong>\u00a0and more so than ever. Companies must develop a deliberate strategy to ensure they gain and safeguard trust with their customers, employees and partners.\u201d<\/p>\n<h2 id=\"h-how-access-management-needs-to-become-stronger\"><strong>How access management needs to become stronger\u00a0<\/strong><\/h2>\n<p>For <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\">64% of <\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\" target=\"_blank\" rel=\"noreferrer noopener\">enterprises<\/a>, digital transformation is essential for survival. And one in five <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\">(<\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\" target=\"_blank\" rel=\"noreferrer noopener\">21<\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\">%)<\/a> say embedding digital technologies into their current business model is necessary if they are to stay in business.\u00a0<\/p>\n<p>It\u2019s innovate-or-die time for businesses that rely on digitally driven revenue. Nine out of 10 enterprises believe their business models must evolve faster than they are evolving today, and <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\">just<\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-new-digital-edge-rethinking-strategy-for-the-postpandemic-era\">11%<\/a> believe their models are economically viable through 2023.<\/p>\n<p>With the economic viability of many businesses on the line even before the economy\u2019s unpredictable turbulence is factored in, it\u2019s encouraging to see boards of directors looking at how they can make zero-trust security frameworks stronger, starting with identity. Credit CISOs when they educate their boards that cybersecurity is a business decision because it touches every aspect of a business today.<\/p>\n<p><a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/analyst-reports\/3705-iam-leaders-guide-access-management.html\">Gartner provides a helpful <\/a><a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/analyst-reports\/3705-iam-leaders-guide-access-management.html\" target=\"_blank\" rel=\"noreferrer noopener\">framework<\/a> for taking a comprehensive, strategic view of the broad scope of <a href=\"https:\/\/venturebeat.com\/security\/automation-and-iam\/\">identity access management (IAM)<\/a> in large-scale enterprises. One of its most valuable aspects is its graphical representation that explains how IAM-adjacent technologies are related to four core areas. Gartner writes in the <a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/analyst-reports\/3705-iam-leaders-guide-access-management.html\">Gartner IAM Leaders\u2019 <\/a><a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/analyst-reports\/3705-iam-leaders-guide-access-management.html\" target=\"_blank\" rel=\"noreferrer noopener\">Guide<\/a><a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/analyst-reports\/3705-iam-leaders-guide-access-management.html\"> to Access Management<\/a> (provided courtesy of <a href=\"https:\/\/www.pingidentity.com\/en.html\" target=\"_blank\" rel=\"noreferrer noopener\">Ping<\/a><a href=\"https:\/\/www.pingidentity.com\/en.html\"> Identity<\/a>) that \u201cthe bigger picture of an IAM program scope includes four main functional areas: Administration, authorization, assurance, and analytics. The AM discipline provides authorization, assurance, analytics, and administrative capabilities. It is responsible for establishing and coordinating runtime access decisions on target applications and services.\u201d<\/p>\n<p>Gartner\u2019s structural diagram is helpful for enterprises that need to sync their zero-trust frameworks, zero-trust network access (ZTNA) infrastructure and tech stack decisions with their organization\u2019s digital transformation initiatives.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" data-lazy-fallback=\"1\" width=\"979\" height=\"712\" alt=\"AM and the bigger scope of IAM\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=979&#038;strip=all 979w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman2.png?resize=979%2C712&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>Strengthening AM in a zero-trust world to protect new digitally driven revenue is a multifaceted challenge that will take a unique form in every enterprise. Source: <a href=\"https:\/\/optimalidm.com\/resources\/blog\/iam-leaders-guide\/\">Optimal IdM blog post<\/a><a href=\"https:\/\/optimalidm.com\/resources\/blog\/iam-leaders-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">,<\/a><a href=\"https:\/\/optimalidm.com\/resources\/blog\/iam-leaders-guide\/\"> IAM Leader\u2019s <\/a><a href=\"https:\/\/optimalidm.com\/resources\/blog\/iam-leaders-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">Guide<\/a><a href=\"https:\/\/optimalidm.com\/resources\/blog\/iam-leaders-guide\/\"> to Access Management<\/a><\/figcaption><\/figure>\n<p>CISOs tell VentureBeat that AM and its core components, including <a href=\"https:\/\/venturebeat.com\/datadecisionmakers\/controlling-access-in-todays-digital-first-world-why-it-really-really-matters\/\">multi-factor authentication (MFA)<\/a>, identity and access management (IAM) and privileged access management, are<a href=\"https:\/\/venturebeat.com\/security\/where-cisos-are-getting-quick-zero-trust-wins-today-to-save-tomorrows-budgets\/\"> quick zero-trust wins<\/a> when implemented well. The key to strengthening AM in a zero-trust world is tailoring each of the following areas to best reduce the threat surfaces of an enterprise\u2019s core business model.\u00a0<\/p>\n<h3><strong>Strengthen user authentication to be continuous<\/strong><\/h3>\n<p>MFA and single sign-on (SSO) are the two most popular forms of identity management and authentication, dominating the SaaS application and platform landscape. CISOs tell VentureBeat MFA is a quick win on zero-trust roadmaps, as they can point to measurable results to defend budgets.<\/p>\n<p>Making sure MFA and SSO techniques are designed into workflows for <a href=\"https:\/\/venturebeat.com\/security\/how-cios-can-drive-identity-based-security-awareness\/\">minimal disruption to workers\u2019 productivity<\/a> is critical. The most effective implementations combine what-you-know (password or PIN code) authentication routines with what-you-are (biometric), what-you-do (behavioral biometric) or what-you-have (token) factors. MFA and SSO are the baselines that every CISO VentureBeat interviewed about their zero-trust initiatives is aiming at today \u2014 or has already accomplished.\u00a0<\/p>\n<p>A crucial part of strengthening user authentication is auditing and tracking every access permission and set of credentials. Every enterprise is dealing with increased threats from outside network traffic, necessitating better continuous authentication, a core tenet of zero trust. ZTNA frameworks are being augmented with IAM and AM systems that can verify every user\u2019s identity as they access any resource, and alert teams to revoke access if suspicious activity is detected.<\/p>\n<h3><strong>Capitalize on improved CIEM<\/strong> from PAM platform vendors<\/h3>\n<p>PAM platform providers must deliver a platform capable of discovering privileged access accounts across multiple systems and applications in a corporate infrastructure. Other must-haves are credential management for privileged accounts, credential valuation and control of access to each account, session management, monitoring and recording. Those factors are table stakes for a cloud-based PAM platform that will strengthen AM in a ZTNA framework.<\/p>\n<p>Cloud-based PAM platform vendors are also stepping up their support for cloud infrastructure entitlement management (CIEM). Security teams and the CISOs running them can get CIEM bundling included on a cloud PAM renewal by negotiating a multiyear license, VentureBeat has learned. The PAM market is projected to grow at a compound annual growth rate of 10.7% from 2020 to 2024, <a href=\"https:\/\/www.gartner.com\/document\/3995669?ref=solrResearch&#038;refval=342513655\">reaching a market value of $2.9 <\/a><a href=\"https:\/\/www.gartner.com\/document\/3995669?ref=solrResearch&#038;refval=342513655\" target=\"_blank\" rel=\"noreferrer noopener\">billion<\/a>.<\/p>\n<p>\u201cInsurance underwriters look for PAM controls when pricing cyber policies. They look for ways the organization is discovering and securely managing privileged credentials, how they are monitoring privileged accounts, and the means they have to isolate and audit privileged sessions,\u201d writes <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/how-pam-mfa-helps-organizations-meet-cyber-insurance-requirements\/\">Larry <\/a><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/how-pam-mfa-helps-organizations-meet-cyber-insurance-requirements\/\" target=\"_blank\" rel=\"noreferrer noopener\">Chinksi<\/a> in CPO Magazine.<\/p>\n<p>Scott Fanning, senior director of product management, cloud security at CrowdStrike, told VentureBeat that the company\u2019s approach to CIEM provides enterprises with the insights they need to prevent identity-based threats from turning into breaches because of improperly configured cloud entitlements across public cloud service providers.<\/p>\n<p>Scott told VentureBeat that the most important design goals are to enforce least privileged access to clouds and provide continuous detection and remediation of identity threats. \u201cWe\u2019re having more discussions about identity governance and identity deployment in boardrooms,\u201d Scott said.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"975\" height=\"900\" alt=\"CrowdStrike's CIEM dashboard\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=975&#038;strip=all 975w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=650&#038;strip=all 650w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/accman1.png?resize=975%2C900&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>CrowdStrike\u2019s CIEM dashboard delivers insights into which indicators of attack (IoAs) are trending, alerts about policy violations, and configuration assessments by policy for identities, lateral movement and least privileged violations to the credential policy level. Source: <a href=\"https:\/\/www.crowdstrike.com\/\">CrowdStrike<\/a><\/figcaption><\/figure>\n<h3><strong>Strengthen unified endpoint management (UEM) with a consolidation strategy<\/strong><\/h3>\n<p>IT and cybersecurity teams are leaning on their UEM vendors to improve integration between endpoint security, endpoint protection platforms, analytics, and UEM platforms. Leading UEM vendors, including <a href=\"https:\/\/www.ibm.com\/security\/unified-endpoint-management\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a>, <a href=\"https:\/\/www.ivanti.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ivanti<\/a>, <a href=\"https:\/\/www.manageengine.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ManageEngine<\/a>, <a href=\"https:\/\/www.matrix42.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Matrix42<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-endpoint-manager\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a> and <a href=\"https:\/\/www.vmware.com\/products\/workspace-one\/unified-endpoint-management.html\" target=\"_blank\" rel=\"noreferrer noopener\">VMWare<\/a>, have made product, service and selling improvements in response to CISOs\u2019 requests for a more streamlined, consolidated tech stack.<\/p>\n<p>Of the many vendors competing, <strong>I<\/strong>BM, Ivanti and VMWare lead the UEM market with improvements in intelligence and automation over the last year. Gartner, in its <a href=\"https:\/\/www.gartner.com\/document\/4017175?ref=solrResearch&#038;refval=339793038\">latest Magic <\/a><a href=\"https:\/\/www.gartner.com\/document\/4017175?ref=solrResearch&#038;refval=339793038\" target=\"_blank\" rel=\"noreferrer noopener\">Quadrant<\/a><a href=\"https:\/\/www.gartner.com\/document\/4017175?ref=solrResearch&#038;refval=339793038\"> for UEM Tools<\/a>, found that \u201csecurity intelligence and automation remains a strength as IBM continues to build upon rich integration with <a href=\"https:\/\/www.ibm.com\/qradar\" target=\"_blank\" rel=\"noreferrer noopener\">QRadar<\/a> and other identity and security tools to adjust policies to reduce risk dynamically. In addition, recent development extends beyond security use cases into endpoint analytics and automation to improve DEX.\u201d<\/p>\n<p>Gartner praised Ivanti\u2019s UEM solution: \u201c<a href=\"https:\/\/www.ivanti.com\/solutions\/unified-endpoint-management\" target=\"_blank\" rel=\"noreferrer noopener\">Ivanti<\/a><a href=\"https:\/\/www.ivanti.com\/solutions\/unified-endpoint-management\"> Neurons for Uni\ufb01ed Endpoint <\/a><a href=\"https:\/\/www.ivanti.com\/solutions\/unified-endpoint-management\" target=\"_blank\" rel=\"noreferrer noopener\">Management<\/a> is the only solution in this research that provides active and passive discovery of all devices on the network, using multiple advanced techniques to uncover and inventory unmanaged devices. It also applies <a href=\"https:\/\/venturebeat.com\/ai\/artificial-intelligence-ai-vs-machine-learning-ml-key-comparisons\/\">machine learning (ML)<\/a> to the collected data and produces actionable insights that can inform or be used to automate the remediation of anomalies.\u201d<\/p>\n<p>Gartner continued, \u201cIvanti continues to add intelligence and automation to improve discovery, automation, self-healing, patching, zero-trust security, and DEX via the Ivanti Neurons platform. Ivanti Neurons also bolsters integration with IT service, asset, and cost management tools.\u201d<\/p>\n<h2><strong>What\u2019s on CISOs\u2019 IAM roadmaps for 2023 and beyond\u00a0<\/strong><\/h2>\n<p>Internal and external use cases are creating a more complex threatscape for CISOs to manage in 2023 and beyond. Their roadmaps reflect the challenges of managing multiple priorities on tech stacks they are trying to consolidate to gain speed, scale and improved visibility.<\/p>\n<p>The roadmaps VentureBeat has seen (on condition of anonymity) are tailored to the distinct challenges of the financial services, insurance and manufacturing industries. But they share a few common components. One is the goal of achieving continuous authentication as quickly as possible. Second, credential hygiene and rotation policies are standard across industries and dominate AM roadmaps today. Third, every CISO, regardless of industry, is tightening which apps users can load independently, opting for only an approved list of verified apps and publishers.<\/p>\n<p>The most challenging internal use cases are authorization and adaptive access at scale; rolling out advanced user authentication methods corporate-wide; and doing a more thorough job of handling standard and nonstandard application enablement.<\/p>\n<p>External use cases on nearly all AM roadmaps for 2023 to 2025 include improving user self-service capabilities, bring-your-own-identity (BYOI), and nonstandard application enablement.<\/p>\n<p>The greater the number of constituencies or groups a CISOs\u2019 team has to serve, the more critical these areas of AM become. CISOs tell VentureBeat that administering internal and external identities is core to handling multiple types of users inside and outside their organizations.<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/access-management-must-get-stronger-in-a-zero-trust-world\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Louis Columbus<\/p>\n","protected":false},"excerpt":{"rendered":"<p>March 8, 2023 10:18 AM Image Credit: Getty Images Access management (AM) done right is the fuel for successful digital transformation. Identities and AM are core to earning customers\u2019 trust \u2014 a must for digital-first initiatives to get a strong start and deliver revenue. AM and identities must be granular, role-based and as just-in-time as<\/p>\n","protected":false},"author":1,"featured_media":615964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4397,1913,46],"tags":[],"class_list":{"0":"post-615963","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-access","8":"category-management","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/615963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=615963"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/615963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/615964"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=615963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=615963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=615963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}