Centrify joins several working groups within the Identity Defined Security Alliance

Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced it has joined several working groups within the Identity Defined Security Alliance (IDSA), a group of identity and security vendors, solution providers, and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Identity Defined Security (IDS) puts identity at the center of the security architecture to provide real-time, intelligence-based access to data and applications by integrating Identity and Access Management (IAM) infrastructure with enterprise cybersecurity technologies.

An identity-centric approach to enterprise security allows enterprises to optimize their cybersecurity investment while controlling risk as IT infrastructures converge.

IDSA working groups are the go-to source for best practices, research, and tools for bringing identity and security together, enabling organizations to reduce the risk of a breach through identity-centric security strategies. Centrify is proud to have joined the following working groups as a member of the IDSA:

  • The Zero Trust Working Group – This working group investigates and develops guidance on the role and impact of identity-centric security on Zero Trust initiatives, including Privileged Access Management (PAM). Centrify is redefining legacy PAM with a cloud-ready Zero Trust approach for modern enterprises.
  • The Technology Framework Working Group – This working group collaborates on the development of the Identity Defined Security Framework, which provides organizations practical guidance on implementing an identity-centric approach to security. The framework is comprised of discrete building blocks of identity and security capabilities (Security Controls) that when combined (Use Cases and Reference Architectures) can meet complex business requirements, supported by people, process, and technology recommendations (IAM best practices) to improve the efficacy of the implementation.
  • The Marketing Steering Committee – This group leverages the marketing expertise and resources of member organizations to raise awareness of Identity Defined Security as the next generation of IAM.

“We commonly hear that identity is the ‘new security perimeter,’ but the reality goes much deeper than that. Identity should really be at the center of enterprise cybersecurity strategies,” said Julie Smith, Executive Director of the IDSA.

“Centrify is at the forefront of this mindset, making identity the key to controlling and securing access to the most critical systems and data, including increasingly important attack surfaces such as cloud, Big Data, DevOps, containers, and more.

“We are grateful for Centrify’s membership and leadership as the IDSA tackles securing these new challenges with an identity-centric approach.”

“Centrify’s deep expertise in Privileged Access Management and Zero Trust gives us a unique perspective and voice at the Identity Defined Security table,” said Dr. Torsten George, Cybersecurity Evangelist at Centrify.

“We are excited to join these critical working groups within the IDSA, and to help develop a framework that cohesively brings identity and security together and reduce the risk of identity-related breaches.”

More about

Don't miss