zillasecurity.com Open in urlscan Pro
141.193.213.20  Public Scan

URL: https://zillasecurity.com/blog/identity-governance-meets-cloud-security-in-identity-security/
Submission: On September 12 via api from IE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Zilla Security
 * Solutions
   * User Access Visibility
   * User Access Reviews
   * Audit Readiness & Reporting
   * Access Policies
   * CIEM
 * Platform
 * Resources
 * Integrations
 * Company
   * About Us
   * Careers
   * Newsroom
 * Blog
 * Get a Demo

Blog


IDENTITY GOVERNANCE MEETS CLOUD SECURITY IN IDENTITY SECURITY

September 1, 2022
by Deepak Taneja


I’m excited to announce that Zilla Security has closed a $13.5M Series A venture
round with Tola Capital, FirstMark Capital, and Pillar VC. 

Zilla’s mission is to automate identity security for organizations of all sizes
and help businesses grow their cloud footprint with control and confidence. Our
success over the last year makes us the fastest growing identity security
platform in the market. But what, exactly, is identity security?


THE TIMES THEY ARE A-CHANGIN’.

A lot has changed over the years. For a long time, security was mostly about
keeping the bad guys out of our networks. In fact, back in the 80s, the network
became the computer, and over the next couple of decades, network security
evolved to become the foundation of an enterprise security practice. 

Today, the cloud is the computer, and increasingly identity security is
synonymous with security!

Does the corporate network even matter much anymore? Not really, except for
on-premises data centers still waiting for the lift-and-shift to the cloud.


IDENTITY IS NOT THE NEW PERIMETER – IT’S THE ONLY PERIMETER!

In the cloud-first, zero-trust world where we live, the security vectors that
matter the most are identity and access. The critical elements organizations
must address are –  What makes an identity trustworthy? And, what access should
be granted to a trusted identity? Unfortunately, in reality these two elements
represent two very different, yet related challenges.

The first challenge organizations face is maintaining identity profiles,
establishing trust in identities through authentication, and enabling
standards-based authentication flows to support SSO.  Fundamentally, this is a
business enablement and IT operational efficiency challenge. It’s the exact
problem identity and SSO providers solve.

The second challenge is ensuring that cloud applications, databases, and
infrastructure are configured so that the right identities get the right access
and nothing more.  And, accomplishing this despite constant changes in cloud
infrastructure, business requirements, and identity, application and data
resource life cycles. This is the precise problem that identity security solves.


IDENTITY SECURITY, WHAT’S IT ALL ABOUT?

Identity security is all about enabling, securing, and managing the access that
all trusted identities – humans, machines, and APIs – have to enterprise
resources. In fact, identity security solutions complement Identity and SSO
providers by delivering four key components:

 * Least privilege security and policy-based remediation of identity related
   vulnerabilities
 * Regulatory compliance through access reviews, SOD, and other access controls
 *  Identity entitlement lifecycle management, so that access, at a fine-grained
   entitlement level, is onboarded, maintained and off-boarded appropriately
 * Governance that ensures adherence to organizational policies and processes


THE CLOUD AND DIGITAL TRANSFORMATION SURFACE NEW CHALLENGES.

While the shift to the cloud has made identity the new perimeter, digital
transformation is driving identity as the critical unifying factor in the
enterprise. Through identity, digital transformation is providing employees,
partners, and customers with controlled access to the resources they need, and
facilitating collaboration.

Both of these trends have significant implications.

 1. Decentralization of security work. With the shift to SaaS, IaaS, and PaaS,
    business teams are acquiring their own applications and managing them
    independently of IT.  Application owners in the business are configuring
    their own applications with productivity and efficiency goals in mind. These
    app owners are effectively doing security work but aren’t quite responsible
    for enterprise security and compliance.
 2. Cloud scale has made manual approaches to managing access untenable. With
    dozens, if not hundreds, of cloud applications in use, manually tracking
    thousands of accounts and entitlements across dynamic resource environments
    is an impossible task. Monitoring and controlling privileged access alone is
    a tall order.
 3. DevOps security is complicated but critical. Digital transformation is
    accompanied by a rapid increase in the number of machine identities, and in
    the complexity of entitlements that DevOps teams need for platforms like
    AWS, Azure and GCP. Securing complex cloud infrastructure with dynamic cloud
    assets and federated identities is a huge struggle.

What organizations need is a unified, holistic, identity security solution that
assigns, monitors, and remediates access on a continuous basis. It includes:

 * Comprehensive support for all the digital services across the business
 * Automation to manage and secure access
 * A simple user experience that enables collaboration between app owners,
   IT/security staff and auditors


ZILLA TO THE RESCUE. 

Zilla delivers an identity security solution focused on comprehensive security
and compliance that is automated and easy to use. Our platform combines identity
governance with cloud security to deliver access visibility, reviews, lifecycle
management, and policy-based security remediation.

Zilla’s no-code integration with SaaS applications like Salesforce, cloud
infrastructure like AWS, and cloud databases like Databricks, is unparalleled. 
Robotic automation, a key pillar of our integration strategy, enables us to
monitor and configure all your web-based applications, even those that don’t
have security APIs. Zilla’s self-learning, intelligent automation easily handles
cloud scale and dramatically reduces your cost of ownership. But the best part,
with Zilla, your team is in the drivers seat, not expensive, third-party
professional services consultants!

Give us a try. Contact us today and see what we can do for you.

Tags
Cloud Security Identity governance Identity security SaaS Security


Zilla Security, Inc
Boston, MA

Discover
 * Platform

About
 * About Us
 * Careers

Resources
 * Integrations
 * Blog

Social
 * Twitter
 * LinkedIn

© 2022 Zilla Security Inc.
 * Terms & Compliance