Broadcom Raises the Bar on Identity Security

A Professional Journey I have been helping enterprises secure their most mission critical web applications through Identity Security for 25 years, starting with architecting the SiteMinder Web SSO technology with pioneer Netegrity. (Truth be told, each time I buy a router, I make sure it includes a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CIO 2022-11
Hauptverfasser: Lander, Vadim, CTO, Identity, Engineer, Distinguished
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A Professional Journey I have been helping enterprises secure their most mission critical web applications through Identity Security for 25 years, starting with architecting the SiteMinder Web SSO technology with pioneer Netegrity. (Truth be told, each time I buy a router, I make sure it includes a Broadcom chip because as an engineer, I trust the company’s development prowess and technology!) Securely connecting identities to their apps ultimately is what Identity and Access Management (IAM) does – while managing the different, sometimes competing, goals of doing so securely, ensuring user satisfaction, enabling business while ensuring operational continuity, and meeting compliance goals. Building it to cloud-native specifications to ensure fit with modern deployment practices — immutable, containerized, zero-down time micro services deployable to incredibly scalable and resilient Kubernetes platforms Using open standards to ensure seamless and cost-effective enterprise architecture for hybrid IT Ensuring 100% API-first and highly extensible functionality for weaving Identity into any application environment and enterprise architecture Accommodating contextual policy infrastructure to keep up with changing business and security conditions in the areas of authentication, authorization and administration Enabling seamless silo-less integration of Identities and Apps, using patterns such as BYOI, JIT, Security Events and others Extending IAM Infrastructure Elsewhere, our work has resulted in extending our IAM infrastructure to maximize reuse and ensure business continuity.
ISSN:0894-9301