Welcome!

News Feed Item

Identity Defined Security Alliance Launches New Initiatives to Help CISOs Better Protect Mobile and Cloud Enterprises

The Identity Defined Security Alliance (IDSA), an organization dedicated to helping enterprises keep their data secure and accessible to the right people at the right time, today announced a series of new actions and initiatives aimed at helping CISOs better protect employees, customers and partners in mobile and cloud-centric enterprises. They include: adding four member companies – CyberArk, F5, SailPoint and SecureAuth – to the IDSA’s already impressive roster; an expanded vision for standard use cases and reference architectures to be implemented by customers, solution providers and vendor alliances; creating an executive board; and launching a customer advisory board.

“The cyber security industry is extremely fragmented, with many different and often competing options and approaches to helping customer organizations tackle and solve very real cyber security problems,” said Michael Suby, Stratecast vice president of research, Frost & Sullivan. “It is exciting to see genuine collaboration forming among cyber security vendors, service providers and customer organizations that help security leaders cut through what can be paralyzing noise. IDSA’s framework for leveraging existing cyber security investments enable improved security and provide industry standards for vendors, solution providers and customers to implement robust intelligent based-access policies and controls to data and applications.”

With four additional members, the IDSA is now comprised of the following leading companies in the identity space:

  • CyberArk
  • Exabeam
  • F5
  • Lieberman Software
  • Netskope
  • Optiv Security
  • Ping Identity
  • SailPoint
  • SecureAuth
  • ThreatMetrix
  • VMWare

These members are working together and with customers to identify, define and publish a common set of use cases and reference architectures for identity-defined security. The IDSA will publish this material so that any enterprise may evaluate the benefits and scope of this powerful paradigm. These same member companies will leverage their existing identity-related technology alliance programs, including the SailPoint Identity+ Alliance, CyberArk C3 Alliance and SecureAuth Connected Security Alliance, to produce vendor-to-vendor integrations that support the IDSA use cases and reference architectures.

In addition to new members, the IDSA today announced the creation of executive and customer advisory boards. The IDSA’s inaugural executive board, which consists of members representing CyberArk, Netskope, Optiv, Ping Identity, SailPoint, SecureAuth, ThreatMetrix and VMWare, was established to provide oversight and governance for the alliance and its members. This board is responsible for the overall charter, use case development process, and oversight of thought leadership and marketing activities to promote the work of the alliance. The executive board will oversee the development of a self-certification process that gives vendors guidelines for certifying their integrations so that customers know that vendor implemented integrations meet the minimum use case requirements.

The inaugural customer advisory board is comprised of professionals from multiple financial services institutions. This board provides input into the vision of how identity fits into the broader cyber security marketplace. It also delivers guidance on use cases and reference architectures that address the evolving security requirements of organizations.

Select Quotes from Identity Defined Security Alliance Members

“As a core component for secure application delivery, F5 has a unique opportunity and responsibility to collaborate with other vendors in the security community to help ensure security, availability and integration capabilities. The IDSA provides a great forum for F5 to work with the alliance members as well as the overall security industry to deliver validated joint solutions.” – Joe Peck, director of product management, F5

“Viewing cyber security as a team sport is an important tenet in our approach to building technology partnerships that deliver measurable, long-term value to our customers through

an integrated security stack. Joining the IDSA is an opportunity to further elevate those customer value propositions, and enhance the connection between identity and security through our privileged account security solutions.” – Adam Bosnian, executive vice president, global business development, CyberArk

“As a founding member of the IDSA, Ping has seen the alliance start to mature from initial concept to a trusted source for best practices and use cases for enterprises looking to maximize their identity and security investments. We also welcome the new members to the alliance as greater vendor collaboration advances the value of the alliance for all our customers.” – Brian Bell, CMO, Ping Identity

“A central pillar of SailPoint’s strategy is to help enterprises make their security policies more identity-aware and their identity policies more security-aware, all in the pursuit of reducing risk, protecting identities and data, and increasing compliance. The IDSA represents a unique opportunity for cross-industry leverage – spanning enterprise customer input, use case definition and prioritization, technology integration and certification, and systems integration and solution delivery – that will make it easier for identity-defined security to become a reality.” – Joe Gottlieb, senior vice president of corporate development, SailPoint

“At SecureAuth, we believe a connected approach to security is the best way to reduce the white space between point security products and keep our customers' applications and data safe. Now as part of the IDSA, we look forward to expanding SecureAuth’s adaptive access control to a larger group of cyber security solution providers, helping prevent the misuse of compromised credentials and delivering even more value to our customers.” – Mike Desai, senior vice president of corporate development, SecureAuth

Several representatives of the IDSA will participate in two sessions at the Cloud Identity Summit (CIS), which was founded by Ping Identity in 2010 with support from industry leaders to bring together the brightest minds across the identity and security industry:

IDSA Lunch and Learn: Identity at the Core of Your Security Strategy? It’s for Real, Tuesday, June 20 at 12 p.m. CT – This demo, collaboratively developed by members of the IDSA, will focus on approaches to reducing the risk of insider threat and compromised credentials by integrating existing cyber security technologies.

Identity Defined Security Panel Keynote, Wednesday, June 21 at 5:30 p.m. CT – This expert panel will discuss how identity and security are growing ever closer together, technically and operationally, and explores how this can help provide better security and improved customer experience.

Security vendors, service providers and customer organizations interested in the mission and vision, published use cases or becoming a part of the IDSA can learn more at www.idsalliance.org.

About Identity Defined Security Alliance

The IDSA is a community founded by Ping Identity in conjunction with Optiv, as the founding solution provider, to bring to the information security industry a forum for thought leadership, customer validation and education, industry supported use cases and a technology showcase, that supports redefining the approach to cyber security. Membership in the IDSA is open to end customers, technology vendors and solution providers who are committed to the vision of an identity centric approach to security.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...