A New Integration Framework to Help CISOs Rapidly Build Identity-Centered Security Solutions



It is encouraging to observe that, IT Teams, executives and boards of directors steadily understand that identity should be at the core of security, in our ever-connected world where Cybersecurity continues to be a top concern for executives.


In effect, CISOs are feeling the pressure to ensure their organizations stay secure while meeting business objectives.
 “To be successful, security leaders need a holistic strategy and program that include the right mix of people, process and technology with identity positioned at the heart of everything’’, said Robert Block, vice president of client solutions, IAM for Optiv.

At the Cloud Identity Summit (CIS), the Identity Defined Security Alliance supported by founding members Ping Identity and Optiv Security announced the release of a new identity integration framework

One can see that, Created jointly by the alliance members, the framework showcases the capabilities and technologies CISOs may need to implement comprehensive solutions that place identity at the center of security. 

Core components are surrounded by the following capabilities and technology categories:
  • Security operations: security incident and event management (SIEM),user and entity behavioral analytics (UEBA), service management, fraud and risk;
  • Risk management:privileged access management (PAM), governance, risk and compliance (GRC)
  • Network security: data protection, data governance, enterprise mobility management (EMM), data loss prevention, and cloud access security brokers (CASB).