Professional Documents
Culture Documents
Zero Trust
Presented by
Debanjali Ghosh
Technical Evangelist,
ManageEngine
The post-pandemic challenges in cybersecurity
Absence of well-defined
perimeters
Due to hybrid work, there is a lack Policies like BYOD have led to an
of geographically-defined increased number of unauthorized
perimeter. devices.
Post-pandemic challenges to
cybersecurity
What to be wary of?
Principles of Zero
Trust
Never trust, always verify
Trust
Never trust, always verify
Trust
Continuous monitoring
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.
Secures hybrid
ecosystems
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.
Policy Engine
Components of Zero Trust
The three key logical structures, as per NIST guidelines.
• Hybrid networks - minimal network visibility and lack of organized device management
• Device and human frailties add up to the weakest links of a supply chain.
• IAM authenticates, authorizes and governs the entities connected to an organizational network.
Adaptive
Authentication
Checklist for
evaluating IAM
solutions
1 2
Adaptive Pre-authentication
Authentication risk profile
Checklist for
evaluating IAM
solutions
1 2
Adaptive Pre-authentication
Authentication risk profile
Checklist for
evaluating IAM
solutions 3
Multi-factor
authentication
1 2
Adaptive Pre-authentication
Authentication risk profile
Checklist for
evaluating IAM
solutions 3 4
Personalized credentials
Contextual decision making
Personalized credentials
For Zero Trust to be the all-seeing-eye that governs
these wider range of components within a network,
IAM holds the key to create, catalog and maintain their
identity profiles.
debs@manageengine.com
Any questions?