Digital Identity , Governance & Risk Management , Identity & Access Management

Shift From Perimeter-Based to Identity-Based Security

Vivin Sathyan of ManageEngine on Zero Trust, IAM for Robust Network Security
Vivin Sathyan, senior technology evangelist, ManageEngine

Organizations are moving from traditional perimeter-based security to identity-based security. This shift focuses on continuous identity verification rather than assuming internal users are automatically trusted, said Vivin Sathyan, senior technology evangelist, ManageEngine. It also strengthens security by treating identity management as an ongoing process, he said.

While some organizations prioritize user security, others focus on devices, applications or networks. These varied priorities, Sathyan said, relate to each organization's specific business domain, emphasizing the need for tailored security strategies.

"Legacy applications are a roadblock to implementing IAM or zero trust. One of the core aspects of zero trust is to make sure that even your applications are modernized," he said.

In this video interview with Information Security Media Group, Sathyan also discussed:

  • Challenges in managing fragmented identities;
  • Robust password policies and multifactor authentication despite the push toward passwordless;
  • The need for role-based access control to streamline and secure access.

Sathyan presents POCs and takes care of implementation and product training in the domains of AD Solutions and IT security. He is a regular speaker at international seminars and user conferences conducted by ManageEngine.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.