Access Management , Artificial Intelligence & Machine Learning , Digital Identity
An Identity-Centric Approach to SecurityVivin Sathyan of ManageEngine on How IAM Will Establish Right User Behavior
An identity-centric approach to security will establish legitimate user behavior against suspicious user behavior using SIEM solution, coupled with machine learning algorithms, says Vivin Sathyan, senior technical evangelist at ManageEngine.
See Also: Live Webinar | Breaking Down Security Challenges so Your Day Doesn’t Start at 3pm
The advent and purpose behind zero trust were to bring identities together using the IAM solution, Sathyan says. "An identity-centric approach boils down to user ID and device ID, and one of the ways to protect these identities is by using a SIEM solution coupled with machine learning algorithms. This will enable in decoding the behaviors of identities and secure the same."
In a video interview with Information Security Media Group at ISMG's Cybersecurity Summit in New Delhi, Sathyan discusses:
- Aligning IAM strategy with a zero trust approach;
- Integrating IAM with existing security frameworks;
- Bridging the components of IAM in establishing security.
Sathyan is a senior technology evangelist at ManageEngine, a division of Zoho Corp. He presents POCs and takes care of implementation and product training in the domains of AD Solutions and IT security. He is a regular speaker at international seminars and user conferences conducted by ManageEngine.