Risk Analysis and Adaptive Policies in Zero Trust Security


A zero trust policy engine is essential to securing the fundamental flow of people accessing resources with devices through a network. In the second part of this series, Dr. Chase Cunningham will explain why controlling the flow of data if identity-based MFA with zero trust policies must be included in any Zero Trust initiative. Hed Kovetz will explain how Silverfort is automatically discovering, monitoring and securing these sensitive non-human accounts with self-learning Zero Trust policies, without requiring password changes.

Other topics covered in this series:

• Why Unified IAM Visibility and Control is Key for Zero Trust Security
• Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
• Enabling Cloud Migration with Identity-Based Zero Trust