Security starts when authentication ends. It's a line I have used a few times over the years as it is one I actually quite believe in. In an era where firewalls are derided as being pretty toothless in the fight against omnipresent complex cyber attacks - and the concept of trusted networks quite rightly become obsolete in the world of "zero trust" - it always seemed odd to me, to put such a large emphasis on stringent authentication services. Clearly authentication is hugely important don't misunderstand, but my point really was that authentication (even with a strong MFA component) becomes less relevant if a) it is not continuous and b) not part of a more holistic approach focused on the access control of services, data and APIs.

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas. I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response.

All four areas have had significant venture capitalist funding over the past 36 months and the use cases and capabilities of each have started to stabilise to a point where buy side procurement and integration is becoming consistent and vendors are identifying their competitive go to market narratives.

So my poll was essentially asking, which of these areas would a buy-side practitioner look to invest in during 2022?

Join our founder Simon Moffatt on February 15th to understand why zero trust network architectures should really not rely on password based authentication. Zero trust is not a technology. It is not even a process. More a concept and culture with regards the re-engineering of network and security resources in order to support the modern, […]
On January 26th, the US Government issued a memorandum, relating to the adoption of zero trust security practices. The memo can be viewed here. What are the main points and how will it shine a light on the role of identity and access management? Page 2 of the document, immediately sets the scene with “significant […]

An independent vendor assessment of Transmit Security, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

A review of the Key Organisational Challenges that exist with respect to Authentication

This post is only available to members.

An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]

An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.