Following our webinar series on “Why Identity is a Crucial Component of Zero Trust Security”, we sat down with guest speaker Dr. Chase Cunningham, for this one-on-one, exclusive interview.

Read this interview to learn:

  • The role of identity in Zero Trust security
  • The benefits of having unified IAM visibility and control for the implementation of Zero Trust security
  • The importance of risk analysis and adaptive policies in Zero Trust security
  • The challenges of implementing Zero Trust in the cloud, for both cloud-native and migrated assets

Read Now

Silverfort delivers the first purpose-built solution that prevents identity-based attacks across all network, on-prem and cloud resources. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all IAM solutions, consolidating their visibility and security controls.

Download this brief to learn:

  • Why identity-based attack are on the rise
  • The benefits of Unified Identity Protection
  • Top use cases for Silverfort’s Unified Identity Protection Platform

Download Now

Watch this short video about Unified Identity Protection, the first security solution that is purpose-built to secure modern enterprises against identity-based attacks. This includes unauthorized access to sensitive resources, the spread of malware via lateral movement, and more.

By Hed Kovetz, CEO and Co-Founder at Silverfort.

Identity is crucial for zero trust security

Zero Trust security goes beyond the traditional perimeter-based security model, and enables companies to migrate assets outside of their on-premise environment without compromising on security. In the final part of this four-part series, our guest speaker Dr. Chase Cunningham, former Forrester VP and Principal Analyst will explain the challenges and the importance of Zero Trust security in the cloud and in hybrid environments. Hed Kovetz will explain how to leverage an identity-based Zero Trust approach to protect cloud and hybrid environments holistically, covering both cloud-native assets and migrated apps, enabling secure ‘Lift and Shift’ cloud migration – no code changes required.

Other topics covered in this series:

Why Unified IAM Visibility and Control is Key for Zero Trust Security
The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative

With hundreds or even thousands of unsupervised, highly-privileged service accounts running in any modern organization, and given the difficulties of securing them, they often become a prime target for attackers. In the third part of this series, our guest speaker Dr. Chase Cunningham, former Forrester VP and Principal Analyst will explain why service accounts, used for machine-to-machine access, must be included in any Zero Trust initiative. Hed Kovetz will explain how Silverfort is automatically discovering, monitoring and securing these sensitive non-human accounts with self-learning Zero Trust policies, without requiring password changes.

Other topics covered in this series:

• Why Unified IAM Visibility and Control is Key for Zero Trust Security
• The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
• Enabling Cloud Migration with Identity-Based Zero Trust

Risk Analysis and Zero Trust Security

With hundreds or even thousands of unsupervised, highly-privileged service accounts running in any modern organization, and given the difficulties of securing them, they often become a prime target for attackers. In the third part of this series, Dr. Chase Cunningham will explain why service accounts, used for machine-to-machine access, must be included in any Zero Trust initiative. Hed Kovetz will explain how Silverfort is automatically discovering, monitoring and securing these sensitive non-human accounts with self-learning Zero Trust policies, without requiring password changes.

Other topics covered in this series:

Why Unified IAM Visibility and Control is Key for Zero Trust Security
Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
Enabling Cloud Migration with Identity-Based Zero Trust

Unified IAM Visibility and Control and Zero Trust Security

Successful Zero Trust implementations focus heavily on telemetry and metrics derived from identities. Anything that has an identity must be considered and verified in order to achieve true Zero Trust security — users, services, devices and cloud assets. Monitoring these identities and their behavior enables deeper understanding of what an entity is doing to better identify and prevent malicious or unauthorized access.

Join Silverfort’s CEO and Co-Founder Hed Kovetz, and guest speaker Dr. Chase Cunningham, former Forrester VP and Principal Analyst for a discussion on the different aspects and the growing importance of identity in Zero Trust implementations.

Other topics covered in this series:

The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
• Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
Enabling Cloud Migration with Identity-Based Zero Trust

There are countless service accounts in any given organization and today, the number of these non-human accounts, and the number of applications that rely on them, is growing each day. These accounts can become high-risk assets that, if left unchecked, may enable threats to propagate throughout the network undetected.

 

 

 

 

 

Download this eBook to learn how in 4 simple steps Silverfort’s Unified Identity Protection platform can:

  • Automatically detect all service accounts
  • Monitor and analyze the use of these sensitive accounts
  • Recommend policies that can easily be turned on to secure the use of these accounts
  • Actively prevent account takeover and alert on suspicious behavior
  • Most importantly: Silverfort can do this WITHOUT changing service account passwords!

Silverfort enables secure authentication for all sensitive corporate assets, both on-premise and in the cloud, including systems that could not be protected until today – without requiring any agents or proxies.

With hundreds or even thousands of unsupervised, highly-privileged service accounts running in modern organizations, they can become high-risk assets. Join us for a discussion about four simple steps you can take to secure these accounts and reduce the risk of a cyber attack.

Speakers

Hed Kovetz, Silverfort Co-Founder and CEO

Hed brings a unique technical and leadership background, including product leadership roles at Verint, where he led the company’s nation-scale cybersecurity product and won the company’s innovation competition for his patent-pending inventions. Hed previously served as a Group Leader at the famous 8200 elite cyber unit of the Israel Defense Forces, where he received the unit’s excellence awards and the Chief of Intelligence Corps Award for Innovation. Hed holds an LL.B. from Tel Aviv University.

Revital Aronis, Sr. Product Manager, Silverfort

Revital is a Senior Product Manager in Silverfort’s PM department. Prior to joining Silverfort, Revital was a product manager at illusive networks, and held different R&D positions at Contextream and HPE. Before that Revital served as a team leader at the 8200 elite cyber unit of the Israel Defense Forces. Revital holds a B.A in Computer Science and Psychology from Tel Aviv University

« Previous PageNext Page »